Video compressive sensing with over-completed dictionary (English)
- New search for: Li, Tao
- New search for: Wang, Xiaohua
- New search for: Li, Tao
- New search for: Wang, Xiaohua
In:
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
;
1056-1060
;
2013
- Conference paper / Electronic Resource
-
Title:Video compressive sensing with over-completed dictionary
-
Contributors:Li, Tao ( author ) / Wang, Xiaohua ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2013-03-01
-
Size:848053 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Title pageLian, Shuaibin / Dai, Xianhua et al. | 2013
- 2
-
Copyright pageZhang, Yan / Huang, Xiaobin et al. | 2013
- 3
-
Contents pageZhang, Xiaowen / Liu, Zhaomin / Xuan, Yuming et al. | 2013
- 12
-
Keynote speakersLai, Renfa / Li, Zejian / Zhou, Zhiying / Sun, Ting / Hu, Yaqun / Xie, Wei et al. | 2013
- 13
-
ICITST-2013: Keynote speaker 1: Principles of information security risk managementWiley, Jeffrey J. et al. | 2013
- 14
-
ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep webStupples, David et al. | 2013
- 15
-
ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future ‘Internet of Things’ (IoT) architecturesBrooks, Tyson T. et al. | 2013
- 16
-
ICITST-2013: Keynote speaker 4: Writing a sustainable research paperShoniregun, Charles A. et al. | 2013
- 17
-
RISC'13 Workshop: Keynote speaker 5Yoon Seok Chang, et al. | 2013
- 18
-
WorkshopsLiu, Jianzhou / Xiao, Liang / Shao, Xiongkai et al. | 2013
- 19
-
Workshop 1: The 3rd international workshop on information security, theory and practice (ISTP-2013)Zeng, Gaofeng / Zong, Shaohui / He, Jianming / Xiong, Chunxiang / Zhang, Zhiyong / Gao, Taihang / Wei, Bo et al. | 2013
- 20
-
Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysisBattikh, D. / El Assad, S. / Bakhache, B. / Deforges, O. / Khalil, M. et al. | 2013
- 26
-
Lightweight chaos-based cryptosystem for secure imagesFawaz, Z. / El Assad, S. / Frajallah, M. / Khalil, A. / Lozi, R. / Deforges, O. et al. | 2013
- 31
-
Cryptanalysis of a chaos-based encryption algorithm for distributed systemsCaragata, Daniel / Tabia, Karim / Luduena, Mauricio et al. | 2013
- 37
-
High-speed encryption method based on switched chaotic model with changeable parametersGarasym, Oleg / Taralova, Ina et al. | 2013
- 43
-
Workshop 2: The 5th international workshop on RFID security and cryptography (RISC'13)Chen, Jiankui / Chen, Maozheng et al. | 2013
- 44
-
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPAAbughazalah, Sarah / Markantonakis, Kostantinos / Mayes, Keith et al. | 2013
- 52
-
Formally defining NFC M-coupon requirements, with a case studyAlshehri, Ali / Schneider, Steve et al. | 2013
- 59
-
Feasibility analysis of transportation applications based on APIs of social network servicesByon, Young-Ji / Young Seon Jeong, / Easa, Said M. / Joonsang Baek, et al. | 2013
- 65
-
Securing E-Seal real time tracking system for Internet of ThingsShemaili, Mouza Ahmed Bani / Yeun, Chan Yeob / Zemerly, Mohamed Jamal / Mubarak, Khalid / Yoon Seok Chang, et al. | 2013
- 70
-
Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part IWang, Qinggang / Wang, Qingfeng et al. | 2013
- 71
-
A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technologyGeerdink, Bas et al. | 2013
- 77
-
A comparison of major issues for the development of forensics in cloud computingAydin, Mustafa / Jacob, Jeremy et al. | 2013
- 83
-
Multidimensional community detection in TwitterZalmout, Nasser / Ghanem, Moustafa et al. | 2013
- 89
-
An analytical study of Arabic sentiments: Maktoob case studyAl-Kabi, Mohammed N. / Abdulla, Nawaf A. / Al-Ayyoub, Mahmoud et al. | 2013
- 95
-
Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part IIYuan, Zhifang / Zhuang, Jinwu / Wang, Chen et al. | 2013
- 96
-
A recommendation scheme utilizing Collaborative FilteringDzugan, Nicholas / Fannin, Lance / Kami Makki, S. et al. | 2013
- 101
-
Sentiment analysis of arabic social media content: a comparative studyKhasawneh, Rawan T. / Wahsheh, Heider A. / Al-Kabi, Mohammed N. / Alsmadi, Izzat M. et al. | 2013
- 107
-
Framework for handling personal data proposed system of the self-control on buying informationNakagawa, Yuri / Matsuda, Yuuki / Ogi, Tetsuro et al. | 2013
- 113
-
End-to-End cryptographic voting: Potentials and limitationsAwad, Mohammed / Leiss, Ernst L. et al. | 2013
- 119
-
Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part IIIXiong, Junhui / Tang, Shengjing / Guo, Jie / Wu, Xuzhong et al. | 2013
- 120
-
A system for social network analysisRinaldi, Luciene Cristina Alves / de Resende, Briseida Dogo / Moreira, Rodrigo Bossini Tavares / Netto, Marcio Lobo et al. | 2013
- 126
-
A privacy-aware query authentication index for encrypted database in cloudMiyoung Jang, / Ara Jo, / Jae-Woo Chang, et al. | 2013
- 132
-
Mining salient images from a large-scale blogosphereXian Chen, / Meilian Chen, / Hyoseop Shin, / Eun Yi Kim, et al. | 2013
- 137
-
Cloudlet-based for big data collection in body area networksQuwaider, Muhannad / Jararweh, Yaser et al. | 2013
- 142
-
A Cloud Enabled Social Media Monitoring Platform for Events Detection and PredictionBenkhelifa, Elhadj / Welsh, Thomas et al. | 2013
- 149
-
Workshop 4: Cloud applications and security (CAS'13)Tang, Ze / Feng, Jianwen / Zhao, Yi et al. | 2013
- 150
-
Considering an elastic scaling model for cloud SecurityMacDermott, Aine / Qi Shi, / Merabti, Madjid / Kifiyat, Kashif et al. | 2013
- 156
-
Security risk analysis as a serviceAlhomidi, Mohammed A. / Reed, Martin J. et al. | 2013
- 162
-
Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows AzureAkinbi, A. / Pereira, E. / Beaumont, C. et al. | 2013
- 168
-
A framework for assuring the conformance of cloud-based emailWillett, Melanie / Von Solms, Rossouw et al. | 2013
- 174
-
SessionsZhang, Wenge / Ding, Rui et al. | 2013
- 175
-
Session 1: Multimedia and web servicesShi, Wei / Zhou, Weiping / Wu, Zhengguo et al. | 2013
- 176
-
Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1FichierZhao, Nan / Baud, Loic / Bellot, Patrick et al. | 2013
- 182
-
DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and CompositionBoukhadra, Adel / Benatchba, Karima / Balla, Amar et al. | 2013
- 188
-
ProtoML: A rule-based validation language for Google Protocol BuffersKalman, Miklos et al. | 2013
- 194
-
The hybrid model for web services security access control and information flow controlKedjar, Saadia / Tari, Abdelkamel et al. | 2013
- 203
-
Session 2: Internet applications and technologyGuo, Jianhua / Chu, Liang / Zhang, Yongsheng / Yu, Dawei / Bai, Dongming et al. | 2013
- 204
-
Indirect NFC-loginBorchert, Bernd / Gunther, Max et al. | 2013
- 210
-
Labeled clustering a unique method to label unsupervised classesShaheen, Muhammad / Iqbal, Saeed / Fazl -e - Basit, et al. | 2013
- 215
-
A workflow for parallel and distributed computing of large-scale genomic dataHyun-Hwa Choi, / Byoung-Seob Kim, / Shin-Young Ahn, / Seung-Jo Bae, et al. | 2013
- 219
-
Internet Unite-and-Conquer architectureKarimi, Kamyab / Hauser, Carl et al. | 2013
- 231
-
Session 3: Ubi/cloud computingWang, Lizhi / Zhou, Jun et al. | 2013
- 232
-
Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management SystemsAlotaibi, Sara Jeza / Wald, Mike et al. | 2013
- 238
-
Energy efficient time synchronization for target tracking in heterogeneous sensor networksDaehee Kim, / Sangwook Kang, / Sunshin An, et al. | 2013
- 244
-
Broker-based Cross-Cloud Federation ManagerAbdo, Jacques Bou / Demerjian, Jacques / Chaouchi, Hakima / Barbar, Kabalan / Pujolle, Guy et al. | 2013
- 252
-
Implementing a high-performance recommendation system using Phoenix++Chongxiao Cao, / Fengguang Song, / Waddington, Daniel G. et al. | 2013
- 258
-
Session 4: Internet applications and technologyZhao, Dingxuan / Zhang, Zhiwen / Li, Mufei / Li, Tianyu / Wang, Chengcheng et al. | 2013
- 259
-
A machine learning based method for optimal journal classificationIqbal, Saeed / Shaheen, Muhammad / Fazl-e-basit, et al. | 2013
- 265
-
Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chainChoi, S.H. / Yang, B. / Cheung, H.H. / Yang, Y.X. et al. | 2013
- 270
-
Web Service constraint optimizationOlmsted, Aspen / Farkas, Csilla et al. | 2013
- 276
-
RUFC: A flexible framework for reliable UDP with flow controlAtya, Ahmed Osama Fathy / Jilong Kuang, et al. | 2013
- 282
-
Session 5: Information securityZhe Ji, / Fan Zhou, / Xiang Tian, / Rongxin Jiang, / Chen, Yaowu et al. | 2013
- 283
-
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge responseFujii, Haruhiko / Tsuruoka, Yukio et al. | 2013
- 288
-
Smartphone security: Overview of security software solutionsFischer, D. / Markscheffel, B. / Seyffarth, T. et al. | 2013
- 290
-
Analysis of security attacks on AODV routingAbdelshafy, Mohamed A. / King, Peter J. B. et al. | 2013
- 296
-
A taxonomy for securely sharing information among others in a trust domainArachchilage, Nalin Asanka Gamagedara / Namiluko, Cornelius / Martin, Andrew et al. | 2013
- 305
-
Session 6: Information securityAn, Libao / Chen, Mingyuan / Yang, Peiqing et al. | 2013
- 306
-
Enhanced Virtual Private Social Networks: Implementing user content confidentialityClarke, Charles / Pfluegel, Eckhard / Tsaptsinos, Dimitris et al. | 2013
- 313
-
DGM approach to network attacker and defender strategiesKayode, Alese Boniface / Babatunde, Iwasokun Gabriel / Haruna Danjuma Israel, et al. | 2013
- 321
-
Zombie-cookies: Case studies and mitigationSorensen, Ove et al. | 2013
- 327
-
Intrusion detection system for Wireless Nano sensor NetworksRahim, Aneel / Malone, Paul et al. | 2013
- 331
-
Session 7: Multimedia and web servicesSingh, Pooran / Vishvakarma, Santosh Kr. et al. | 2013
- 332
-
Pedagogical hypermédias systemsAmmar, Brika / Fahima, Nader et al. | 2013
- 338
-
Adaptation of Web services using policiesVelasco, Margarita / While, David / Raju, Pathmeswaran et al. | 2013
- 344
-
Feedback-driven clustering for automated linking of web pagesOest, Adam / Rege, Manjeet et al. | 2013
- 350
-
Context-aware RESTful services on mobile devicesvan der Westhuizen, Charl / Coetzee, Marijke et al. | 2013
- 356
-
Session 8: Cloud securityWei, Xuejie / Zhang, Jie / Yang, Zhao / Zhao, Zhen et al. | 2013
- 357
-
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files securityYulianto, Aditya / Kom, S. / Prasetiyowati, Maria Irmina et al. | 2013
- 363
-
Towards healthcare data security in cloud computingElmogazy, Huda / Bamasak, Omaima et al. | 2013
- 369
-
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchangeAl-Assam, Hisham / Rashid, Rasber / Jassim, Sabah et al. | 2013
- 375
-
Virtual machine remote detection method using network timestamp in cloud computingNoorafiza, Matrazali / Maeda, Hiroshi / Kinoshita, Toshiyuki / Uda, Ryuya et al. | 2013
- 381
-
Session 9: Information securityYu, Lan / Deng, Linhua / Yang, Yunfei / Feng, Song et al. | 2013
- 382
-
Analysing and attacking the 4-way handshake of IEEE 802.11i standardAlabdulatif, Abdullah / Ma, Xiaoqi / Nolle, Lars et al. | 2013
- 388
-
Towards the design of a film-based graphical password schemeCatuogno, Luigi / Galdi, Clemente et al. | 2013
- 394
-
Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystemsPeretti, Chiara / Gastaldo, Paolo / Stramezzi, Marco / Zunino, Rodolfo et al. | 2013
- 401
-
DCT sign-based robust image hashingPrungsinchai, Supakorn / Khelifi, Fouad / Bouridane, Ahmed et al. | 2013
- 406
-
Session 10: Internet applications, infonomics, e-learning and e-technologyYang, Bo / Zhang, Wensheng / Xie, Yuan / Li, Qingchun et al. | 2013
- 407
-
Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE)Costello, Robert / Shaw, Nigel et al. | 2013
- 411
-
Improving the effectiveness of collaborative learning processes in Libyan Higher EducationKenan, Thuraya / Pislaru, Crinela / Elzawi, Abdussalam / Restoum, Maysoun et al. | 2013
- 417
-
Results on implementing personal learning environments in Tanzanian secondary schoolsMselle, Leonard J. / Kondo, Tabu S. et al. | 2013
- 422
-
Edge detection methods in palm-print identificationAkinsowon, O. A. / Alese, B. K. et al. | 2013
- 427
-
Session 11: Information securityPopovic, Miroslav / Basicevic, Ilija / Djukic, Miodrag / Cetic, Nenad et al. | 2013
- 428
-
Threat methodology for securing scalable video in the CloudKhan, Afnan Ullah / Oriol, Manuel / Kiran, Mariam et al. | 2013
- 437
-
Counter botnet activities in the Netherlands a study on organisation and effectivenessSchless, Timo / Vranken, Harald et al. | 2013
- 443
-
Automation and evaluation of the semantic annotation of Web resourcesDammak, Sahar Maalej / Jedidi, Anis / Bouaziz, Rafik et al. | 2013
- 449
-
Post-Quantum Crystography: A combination of Post-Quantum Cryptography and SteganographyGabriel, A.J / Alese, B.K. / Adetunmbi, A.O. / Adewale, O.S. et al. | 2013
- 453
-
Session 12: Information securityMa, Yongzheng / Shi, Taotao / Li, Wei / Qian, Fang / Ning, Kang / Cui, Chenzhou / Zhu, Yunqiang et al. | 2013
- 454
-
A model of component interaction between Formal, Technical and Informal components within IS/IT security governanceMusa, Nadianatra / Clift, Bob et al. | 2013
- 463
-
An access control model for easy management of patient privacy in EHR systemsSicuranza, Mario / Esposito, Angelo et al. | 2013
- 471
-
Evaluation of third party tracking on the webHamed, Asma / Kaffel-Ben Ayed, Hella / Kaafar, Mohamed Ali / Kharraz, Ahmed et al. | 2013
- 478
-
Session 13: Internet applications and technologyTu, Shitao / Zhu, Lanjuan et al. | 2013
- 479
-
Design and implementation of the contents visualization system for social networksJong-Hoon Lee, / Jung-Tae Kim, / Ik Kyun Kim, / Ki-Jun Han, et al. | 2013
- 484
-
Design and development of Anti-XSS proxyShahriar, Hossain / North, Sarah / Wei-Chuen Chen, / Mawangi, Edward et al. | 2013
- 490
-
Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the InternetElzawi, Abdussalam / Wade, Steve / Kenan, Thuraya / Pislaru, Crinela et al. | 2013
- 494
-
Design and implementation of microcontroller based short message service control systemPrince, Nwankwo Nonso et al. | 2013
- 500
-
Session 14: Information securityZhang, Shaolong et al. | 2013
- 501
-
A methodology to build run-time monitors for security-aware workflowsBertolissi, Clara / Ranise, Silvio et al. | 2013
- 503
-
Grayscale image encryption using a hyperchaotic unstable dissipative systemOntanon-Garcia, L. J. / Garcia-Martinez, M. / Campos-Canton, E. / Celikovsky, Sergej et al. | 2013
- 508
-
Social engineering in social networking sites: Affect-based modelAlgarni, Abdullah / Xu, Yue / Taizan Chan, / Yu-Chu Tian, et al. | 2013
- 516
-
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware applicationBrooks, Tyson / Kaarst-Brown, Michelle / Caicedo, Carlos / Joon Park, / McKnight, Lee et al. | 2013
- 524
-
A new encryption scheme based on hybrid ProblemsSahu, Hemlal / Sharma, B. K. et al. | 2013
- 528
-
Session 15: Cloud securityShen, Bo / Zhou, Xingshe / Yang, Gang et al. | 2013
- 529
-
Trustworthy evidence gathering mechanism for multilayer cloud complianceFlorian, Markus / Paudel, Sarita / Tauber, Markus et al. | 2013
- 531
-
A comparative study between modern encryption algorithms based on cloud computing environmentJasim Mohammad, Omer K. / Abbas, Safia / El-Horbaty, El-Sayed M. / Salem, Abdel-Badeeh M. et al. | 2013
- 536
-
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area NetworkRamli, Sofia Najwa / Ahmad, Rabiah / Abdollah, Mohd Faizal et al. | 2013
- 542
-
Security in the cloud based systems: Structure and breachesShandilya, Vivek / Shiva, Sajjan et al. | 2013
- 548
-
Session 16: Internet applications and technologyLi, Qinggong / Chen, Zhen / Song, Wenhua / Lv, Lingyue et al. | 2013
- 549
-
Pseudo Eye: The next-generation shopping application using Augmented RealityAnanda Kanagaraj S, / Arjun G, / Sree Sharmila T, et al. | 2013
- 554
-
Information Access Assistant Service (IAAS)Kabore, Kiswendsida K. / Sie, Oumarou / Sedes, Florence / Peninou, Andre et al. | 2013
- 558
-
Towards an efficient shopping mechanism for M-commerceur Rehman, Shafiq / Ejaz, Naveed et al. | 2013
- 563
-
Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationshipsNakayama, Hiroki / Onuma, Ryo / Kaminaga, Hiroaki / Miyadera, Youzou / Yokoyama, Setsuo / Nakamura, Shoichi et al. | 2013
- 569
-
Session 17: Information securityHong, Lin / Jiang, Ying / Zhou, Yigang et al. | 2013
- 570
-
Reinforcing network security by converting massive data flow to continuous connections for IDSSalem, Maher / Buehler, Ulrich et al. | 2013
- 576
-
Access control enforcement in Named Data NetworkingHamdane, Balkis / Serhrouchni, Ahmed / El Fatmi, Sihem Guemara et al. | 2013
- 582
-
Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automataRanaee, Iman / Nia, Mahdi Majidi / Jahantigh, Reza / Gharib, Amirhossein et al. | 2013
- 588
-
SecureDIS: A framework for secure Data Integration SystemsAkeel, Fatimah Y. / Wills, Gary B. / Gravell, Andrew M. et al. | 2013
- 595
-
Session 18: Ubi/cloud computingBao, Lidan / Xu, Si / Zhang, Tiejun / Wang, Donghui / Hou, Chaohuan et al. | 2013
- 596
-
Automatic data reuse for accelerating data intensive applications in the CloudHan, Liangxiu / Xie, Zheng / Baldock, Richard et al. | 2013
- 601
-
Adaptive market place for converged cloud computing modelMusa, Ibrahim Kabiru / Walker, Stuart D. et al. | 2013
- 607
-
Access control in probative value CloudMsahli, Mounira / Abdeljaoued, Rached / Serhrouchni, Ahmed et al. | 2013
- 612
-
Security risks in the short-range communication of ubiquitous applicationEvesti, Antti / Suomalainen, Jani / Savola, Reijo et al. | 2013
- 618
-
Session 19: Infonomics and e-technologyGan, Shuzhen / Yang, Jianfeng / Yang, Yufang et al. | 2013
- 619
-
Anomaly detection in Online Social Networks using structure-based techniqueRezaei, Abdolazim / Kasirun, Zarinah Mohd / Rohani, Vala Ali / Khodadadi, Touraj et al. | 2013
- 623
-
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassiesAdedayo, Love / Butakov, Sergey / Ruhl, Ron / Lindskog, Dale et al. | 2013
- 630
-
A prosodic Text-to-Speech system for Yorùbá languageAkinwonmi, Akintoba Emmanuel / Alese, Boniface Kayode et al. | 2013
- 636
-
Implementation and evaluation of classroom simulation for trainee teacher using second life environmentsAlotaibi, Fahad / Dimitrov, Jordan et al. | 2013
- 644
-
Session 20: Ubi/cloud computingWang, Xiaobin / Zhang, Malu / Yang, Yuanjing et al. | 2013
- 645
-
Security standards taxonomy for Cloud applications in Critical Infrastructure ITPaudel, Sarita / Tauber, Markus / Brandic, Ivona et al. | 2013
- 647
-
Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systemsSilva, Bruno / Maciel, Paulo / Zimmermann, Armin et al. | 2013
- 653
-
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilitiesKandira, Muteveri / Mtsweni, Jabu / Padayachee, Keshnee et al. | 2013
- 659
-
Keystone federated securitySitaram, Dinkar / Phalachandra, H. L. / Vishwanath, Anush / Ramesh, Pramod / Prashanth, Meghana / Joshi, Akshay G / Desai, Anoop R / Harikrishna Prabhu C R, / Prafulla, / Shwetha R, et al. | 2013
- 665
-
Session 21: Internet applications and technologyLiu, Xusong / Zhan, Xingmeng / Xiao, Liang et al. | 2013
- 666
-
Security in software engineering requirementAl-Shorafat, Wafa Slaibi et al. | 2013
- 674
-
Real-time adaptive arrival prediction system for public transportObrul, Denis / Zalik, Borut et al. | 2013
- 678
-
Methods for strategic accumulation of context information in research activitiesOnuma, Ryo / Nakayama, Hiroki / Kaminaga, Hiroaki / Morimoto, Yasuhiko / Miyadera, Youzou / Nakamura, Shoichi et al. | 2013
- 684
-
Using multi-agent systems to solve food distribution problem in disaster areaManzoor, Umar / Zubair, Maria / Batool, Kanwal et al. | 2013
- 694
-
Introducing clocks-events to csp for modeling real-time systems with multi-clockShao, Zhucheng / Geng, Juanjuan et al. | 2013
- 698
-
Numerical simulation of liquid chlorine tank leak based on FLUENTLi, Qinggong / Lv, Lingyue / Song, Wenhua / Chen, Zhen et al. | 2013
- 702
-
Real time multi stage unsupervised intelligent engine for NIDS to enhance detection rate of unknown attacksAmoli, Payam Vahdani / Hamalainen, Timo et al. | 2013
- 707
-
Comparison of NoC routing algorithms based on packet-circuit switchingDu, Gaoming / He, Jing / Song, Yukun / Zhang, Duoli / Wu, Huajie et al. | 2013
- 711
-
Three-dimensional dynamic simulation of landslide disasterLi, Yong / An, Ru / Wu, Huayi et al. | 2013
- 714
-
Design of a dynamic reconfigurable coprocessor for flexible precision matrix algorithms in media processing and industrial control applicationsLiu, Hao / Li, Zhaolin / Chen, Zhixiang et al. | 2013
- 718
-
A threshold value-based group key management for satellite networkJiao, Wencheng / Hu, Jianwang / Lu, Zhengjun / Xu, Jing et al. | 2013
- 722
-
BGP performance analysis for large scale VPNMai, Jian / Du, Jiang et al. | 2013
- 726
-
Learning models to simulate electricity marketsDong, Xiuming et al. | 2013
- 729
-
A novel burst assembly algorithm for OBS network based on Auto-Search Optimal Assembly ThresholdGeng, Shouhao / Li, Guangming / Guo, Zunhua et al. | 2013
- 734
-
The theoretical analysis on a regression model of labor-capital relationWang, Jihong / Guo, Shuzhen et al. | 2013
- 738
-
On the collapse of graphs related to scale-free networksYao, Bing / Wang, Hongyu / Yao, Ming / Chen, Xiang'en / Yang, Chao / Zhang, Xiaomin et al. | 2013
- 744
-
An intelligent resource allocation mechanism in the cloud computing environmentSun, Jiajia / Wang, Xingwei / Huang, Min et al. | 2013
- 751
-
An affinity propagation algorithm base on self-tuning kernel geodesic distanceZhang, Jianpeng / Chen, Fucai / Liu, Lixiong / Niu, Dongdong et al. | 2013
- 757
-
The research of improving SSL handshake performanceZi, Yun / Xu, Ping et al. | 2013
- 761
-
Novel method for the prediction of mobile location based on temporal-spatial behavioral patternsZolotukhin, Mikhail / Ivannikova, Elena / Hamalainen, Timo et al. | 2013
- 767
-
The brittleness evaluation of complex systemZhang, Pei / Feng, Lu et al. | 2013
- 771
-
Different Zhang functions leading to various ZNN models illustrated via solving the time-varying overdetermined system of linear equationsZhang, Yunong / Li, Weibing / Guo, Dongsheng / Mu, Bingguo / Zheng, Huicheng et al. | 2013
- 777
-
An online Chinese-English academic dictionary based on bilingual literature abstractsZheng, Qi / Jiang, Shengyi et al. | 2013
- 780
-
Finite element simulation for the mechanical property of optics cabinZhang, Tianyi et al. | 2013
- 783
-
Convergence analysis of semi-supervised clustering ensembleChen, Dahai / Yang, Yan / Wang, Hongjun / Mahmood, Amjad et al. | 2013
- 789
-
Information security culture assessment: Case studyAl-Mayahi, Ibrahim / Mansoor, Sa'ad P. et al. | 2013
- 793
-
Database replication technology having high consistency requirementsZhou, Ting / Wei, Yu et al. | 2013
- 798
-
Multi-criteria pre-selection in heterogeneous wireless networksZhang, Yuanyuan / Wang, Jian et al. | 2013
- 802
-
Query expansion terms based on positive and negative association rulesLiu, Caihong / Qi, Ruihua / Liu, Qiang et al. | 2013
- 809
-
BAPAWSC: A new dynamic web service composition algorithm in distributed environmentsZhao, Minglei / Zhao, Wendong / Peng, Laixian et al. | 2013
- 815
-
A dynamic trust updating model based on multiple constraints in wireless mesh networksPeng, Sancheng / Yang, Aimin / Zhong, Hui / Feng, Ziyuan et al. | 2013
- 820
-
Query and data distribution strategy of data cube in cloud computationLu, Xiaoyan et al. | 2013
- 824
-
An effective community detection algorithm of the social networksHuang, Yuan / Hou, Wei / Li, Xiaowei / Li, Shaomei et al. | 2013
- 828
-
Design and implementation of digital products vertical search engine based on Android clientHuang, Xixin / Zhou, Lanjiang / Wang, Chaobin et al. | 2013
- 832
-
Multi-document Biased Summarization based on topic-oriented characteristic database of term-pair Co-occurrenceLiu, Nan / He, Yanxiang / Chen, Qiang / Peng, Mn / Fang, Wenqi et al. | 2013
- 838
-
Research on computational model of ammunition consumption for shipborne shrapnelHu, Jiang / Li, Jinjun / Xie, Weihe et al. | 2013
- 841
-
The community detection algorithm based on transferring the similarityNiu, Dongdong / Chen, Hongchang / Liu, Lixiong et al. | 2013
- 846
-
A simple simulation environment for calculating the Video Destruction Level of Internet Certification ServiceWang, Wei / Huang, Hao / Xie, Changsheng et al. | 2013
- 850
-
A high performance inter-chip fiber communication scheme with short frame protocolZhang, Qinhong / Li, Zhaolin / Pei, Songwei et al. | 2013
- 854
-
Adaptive image denoising using wavelet thresholdingDong, Liwen et al. | 2013
- 858
-
Fast detection method of checkerboard corners based on the combination of template matching and Harris OperatorSu, Jiandong / Duan, Xiusheng / Xiao, Jing et al. | 2013
- 862
-
Practical on-line near-duplicate detection for web videoBao, Wei / Ji, Lixin / Liu, Lixiong et al. | 2013
- 867
-
An efficient and secure pairwise key establishment scheme for wireless sensor networksLi, Sujun et al. | 2013
- 870
-
A design of sounding rocket video processing system based on wavelet transform compression algorithmWang, Linlin / Chen, Ping / Jiang, Xiujie / Chen, Zhimin / Liu, Bo et al. | 2013
- 874
-
External attack of a quantum secret sharing schemeShi, Jianhong / Zhang, Shengli / Chang, Zhenggang et al. | 2013
- 878
-
An approach to optimize mashup based on QoS-Skyline and transactional propertiesYang, Wanchun / Zhang, Chenxi / Mu, Bin et al. | 2013
- 883
-
Architecture research of Decision Support System for Tariff and Trade based on the multi-dimensional modeling techniquesYu, Changping et al. | 2013
- 889
-
Cooperative co-evolution with correlation identification grouping for large scale function optimizationSun, Jingjing / Dong, Hongbin et al. | 2013
- 894
-
Satellite multi-group key managementSun, Yanming / Ma, Hengtai et al. | 2013
- 900
-
Research on mobile collaborative working environments for digital media technology educationGao, Feng / Hope, Martin / Fan, Tongrang et al. | 2013
- 904
-
Position prediction based method for detecting the track center of the Smart carHao, Yuexing / Liu, Yu et al. | 2013
- 907
-
Real-time keypoint-based object tracking via online learningGuo, Bo / Liu, Juan et al. | 2013
- 912
-
Design of Video Monitoring System based on FPGALiu, Caihong / Ji, Jinshui / Liu, Zilong et al. | 2013
- 915
-
Technology innovation strategy of photovoltaic enterprise based on game analysisGeng, Hejiang / Zhang, Renjun et al. | 2013
- 919
-
A fault-tolerant scheduling algorithm based on grouping for real-time multiprocessorYu, Xingbiao / Zheng, Changwen / Hu, Xiaohui / Zhao, Junsuo et al. | 2013
- 924
-
Toward active and efficient privacy protection for AndroidLuo, Yuhao / Gu, Dawu / Li, Juanru et al. | 2013
- 930
-
Smoothing LUT classifiers for robust face detectionWen, Jiabao / Xiong, Yueshan et al. | 2013
- 937
-
Bottom-up hierarchical real-time risk assessment for information systemLi, Wan / Tian, Shengfeng et al. | 2013
- 942
-
Traffic incident detection based on HMMXu, Yang et al. | 2013
- 946
-
Genetic algorithm and ant colony algorithm based Energy-Efficient Task SchedulingZhao, Jianfeng / Qiu, Hongze et al. | 2013
- 951
-
Forecasting software damage rate from cognitive bias in software requirements gathering and specification processChotisarn, Noptanit / Prompoon, Nakornthip et al. | 2013
- 957
-
The application of XML-based information interactive model in aircraft manufacturing project managementCheng, Xiang / Zhao, Gang / Chen, Changyu / Wang, Wei et al. | 2013
- 961
-
Hadoop-based service registry for geographical knowledge service cloud: Design and implementationLin, Jianfeng / Wu, Xiaozhu / Chen, Chongcheng / Liu, Yewei et al. | 2013
- 967
-
Examples initialization in Chinese text categorizationCheng, Shi / Shi, Yuhui / Qin, Quande et al. | 2013
- 972
-
Class-wise information gainZhang, Pengtao / Tan, Ying et al. | 2013
- 979
-
A unified distance measure scheme for orientation coding in identificationZheng, Shaoqiu / Tan, Ying et al. | 2013
- 986
-
3D surface reconstruction based on KinectChen, Congmei / Zou, Wei / Wang, Jiajun et al. | 2013
- 991
-
A modified McEliece public key encryption system with a higher security levelZhang, Ke / Tomlinsin, Martin / Ahmed, Mohammed Zaki et al. | 2013
- 997
-
Influence of scattering properties due to complex refractive index of iceWang, Jinhu / Ge, Junxiang / Wei, Ming / Yu, Wenwen et al. | 2013
- 1000
-
Topography influence on rainfall and precipitation distribution of Hunan ProvinceZhou, Shenghui / Wei, Ming / Wang, Hao et al. | 2013
- 1005
-
The wind and temperature information of AMDAR data applying to the analysis of severe weather nowcasting of airportZhou, Yuan / Wei, Ming / Zhoujie Cheng, / Yinghui Ning, / Linlin Qi, et al. | 2013
- 1011
-
Improving availability of AGPS positioning algorithm with fuzzy theoryLi, Jizhong / Liu, Jinmei et al. | 2013
- 1016
-
The adaptive research of data layout in large-scale meteorological data storage systemJiang, Xueying / Chen, Wenhui / Wang, Yao et al. | 2013
- 1021
-
Simulated conformal dome wind tunnel experimentsWei, Qun / Jia, Hongguang et al. | 2013
- 1024
-
The climate characteristics of Jiangsu freezing weatherSun, Yan / Zong, Peishu / Yang, Tingya / Wang, Weili et al. | 2013
- 1029
-
Study on spatial-temporal distribution and tendency variation characteristics of annual precipitation in Jiangxi ProvinceXie, Yiwen / Lin, Kangli / Yang, Shenbang / Lin, Ruiyong et al. | 2013
- 1033
-
Improving the efficiency of BRT lane utilization by allowing taxis driving in during released period based on rail block techniqueMao, Jieyi / Nai, Wei / Dong, Decun / Zheng, Wenyi / Chen, Shuai et al. | 2013
- 1037
-
The design of a high speed and high precision sigma-delta modulatorHan, Shuangwei / Wang, Yuliang et al. | 2013
- 1042
-
Design of speech recognition systemWang, Chao / Zhu, Ruifei / Jia, Hongguang / Wei, Qun / Jiang, Huhai / Zhang, Tianyi / Yu, Linyao et al. | 2013
- 1045
-
A Wireless Sensor Network for monitoring of physical conditionsDiakite, Laye Hadji / Li, Yu et al. | 2013
- 1049
-
Single frequency GNSS integer ambiguity resolution with adaptive genetic algorithmXu, Dingjie / Liu, Mingkai / Zhu, Liye et al. | 2013
- 1052
-
Error concealment for low bit rate video communicationXia, Wei / Yang, Di et al. | 2013
- 1056
-
Video compressive sensing with over-completed dictionaryLi, Tao / Wang, Xiaohua et al. | 2013
- 1061
-
Multipath transmission through cooperative network-coded in IPN Internet based on Linear Block CodesGou, Liang / Bian, Dongming / Zhang, Gengxin et al. | 2013
- 1067
-
An efficient active contour with Gaussian distribution fitting energyWang, Hui / Huang, Tingzhu et al. | 2013
- 1072
-
Symbol timing offset tracking for DRM receiverQin, Guoche / Yan, Ming / Hu, Guorong et al. | 2013
- 1076
-
The bandwidth allocation by queue length (BA-QL) for WiMAX networkChern, HannTzong / Xu, BoHan et al. | 2013
- 1081
-
Vehicle network system communication error detectionLi, Hongmei / Tong, Weiming / Cheng, Shukang et al. | 2013
- 1085
-
The prosodic effect on the temporal realization of segments in ChineseWang, Maolin / Wei Xiong, / Yezi Wu, / Guangling Zi, / Ziyu Xiong, et al. | 2013
- 1089
-
Combined degree distribution: A simple method to design the degree distribution of fountain codesZhang, Meng / Lei, Weijia / Xie, Xianzhong et al. | 2013
- 1093
-
SER performance of opportunistic relaying with direct link using antenna selectionHussain, Ayaz / Bhutto, Zuhaibuddin / Ahmed, Zahoor et al. | 2013
- 1096
-
Polar coding for fading channelIslam, Muhammed Kamrul / RongKe Liu, et al. | 2013
- 1099
-
Fabric defect detection based on Butterworth filtersZhang, Yingying / Han, Runping et al. | 2013
- 1104
-
End-to-end flow inference of encrypted MANETChang, Huijun / Shan, Hong et al. | 2013
- 1110
-
High-precision weighted Bounding Box localization algorithm for Wireless Sensor NetworkShi, Xin / Zhang, Linghua et al. | 2013
- 1114
-
Simulation of coupling studies of EMP to microstrip lines based on MRTD methodFeng, Yanbin / Li, Guolin / Li, Chunrong et al. | 2013
- 1118
-
Research of liquid precursor chemicals recognition based on principal component analysisYu, Daoyang / Liu, Ping / Li, Yanling / Li, Minqiang / Liu, Jinhuai et al. | 2013
- 1121
-
A case study of small and medium-sized enterprises' entrepreneurial models based on independent innovationLo, Andrew et al. | 2013
- 1127
-
The effect of coarticulation in disyllabic sequences in ChineseWang, Maolin / Guangling Zi, / Yisi Liu, / Wei Xiong, / Ziyu Xiong, et al. | 2013
- 1131
-
A multirate cooperative MAC protocol employing statistic channel state informationPi, Xurong / Cai, Yueming / Yang, Wendong et al. | 2013
- 1136
-
Performance analysis for relay selection with secrecy constraints in cooperative networksYanming Sheng, / Chunxiao Cai, / Yueming Cai, / Weiwei Yang, / Wendong Yang, et al. | 2013
- 1140
-
Satellites scheduling based on DMC encoded method and Pareto Front Motivated Particle Swarm Optimization algorithmYuan, Yin / Deng, Yong et al. | 2013
- 1145
-
Kalman filter-based tracking of burst DSSS signalZhou, Xionglin / Liu, Bo / Cheng, Jian / Shi, Shengchao et al. | 2013
- 1149
-
Design of urban intelligent traffic signal control system for large special eventsXie, Yinfen et al. | 2013
- 1152
-
Design of real-time traffic information service system for large special eventsXie, Yinfen et al. | 2013
- 1155
-
Design of variable length code decoder for AVS based on FPGALi, Shenghong / Wang, Zuqiang / Jiang, Xia et al. | 2013
- 1159
-
Separation and reconstruction method for BSS separated source signal blocks in time domainZhao, Wei / Yuehong Shen, / Wang, Jiangong / Hui Li, et al. | 2013
- 1164
-
Regularized fuzzy clustering for fast image segmentationLiu, Guoqi / Zhou, Zhiheng / Xie, Shengli et al. | 2013
- 1168
-
Ultra-wideband planar inverse-F antenna with periodic metal patches ground planeLiu, Haixia / Wang, Fei / Shi, Xiaowei / Li, Long et al. | 2013
- 1171
-
An improved scheme for low complexity of PAPR reduction in OFDM systemLu, Lu / Guo, Daoxing / Yang, Long / Yang, Maoqiang et al. | 2013
- 1175
-
Land-use and land-cover analysis with remote sensing imagesLiu, Jinmei / Li, Jizhong et al. | 2013
- 1178
-
A wide frequency coverage synthesizer with high performance for 3MHz–5GHz transceiverLin Wang, / Yuanwang Yang, / Jiangyue Cai, / Gang Liu, et al. | 2013
- 1182
-
MIM: A new class of hybrid channel error modelHan, Gang / Lu, Jia / Wang, Junhui / Wu, Guofu / Zhu, Yaokai / Dou, Wenhua et al. | 2013
- 1186
-
1 V UWB CG LNA at 3–8 GHz with bulk-bias methodChen, Yenheng / Yang, Jengrern et al. | 2013
- 1190
-
The study to realize effective sharing for education resource based on grid technologyXiong, Shitao / Chen, Changjiang / Huang, Jinhua et al. | 2013
- 1193
-
An efficient network transmission design based on Raptor CodeXue, Yahui / Wang, Feifei / Wang, Jian et al. | 2013
- 1197
-
Qos-Awareness variable neighbor selection for mesh-based P2P live streaming systemWang, Lei / Zhang, Dengyi / Yang, Hongyun et al. | 2013
- 1202
-
Physical layer security for multiuser two-way relay using distributed auction gameWang, An / Cai, Yueming / Guan, Xinrong / Wang, Songqing et al. | 2013
- 1208
-
Evaluating HF antenna communication efficiency based on the influence by irregular terrainZhang, Zhigang / Li, Ting / Luo, Guangsheng / Sun, Jianping et al. | 2013
- 1212
-
Analysis and simulation of HPAs' effects on satellite OFDM systemsCheng, Lei / Tong, Xinhai / Wu, Jiuyin / Kong, Bo et al. | 2013
- 1217
-
Inter-block Differentially Coherent Integration for GPS L5 signal acquisitionLin, Song / Chen, Lingyu et al. | 2013
- 1221
-
An effective data scheduling algorithm for mesh-based P2P live streamingZhang, Dengyi / Wang, Lei / Yang, Hongyun et al. | 2013
- 1225
-
Voice conversion using Bilinear Model integrated with joint GMM-based classificationSun, Xinjian / Zhang, Xiongwei / Yang, Jibin / Cao, Tieyong et al. | 2013
- 1229
-
Linear LLR approximation for LDPC decoding using a Gaussian approximationZhong, Xinyi / Xu, Youyun / Xu, Kui et al. | 2013
- 1232
-
A novel constructing method of wavelength-time OOC based on outer product matrixLi, Xiaobin / Lu, Lizhi et al. | 2013
- 1237
-
Energy-efficient joint resource allocation in two-way OFDM relay systemsQu, Junyue / Cai, Yueming / Yang, Wendong et al. | 2013
- 1242
-
Detection of DS &FH hybrid Spread Spectrum Signal in TT & C communicationMeng, Fanji / Zhang, Lei / Wang, Yuwen et al. | 2013
- 1246
-
Scheduling multipoint-to-point transmissions over HSDPA based Single Frequency NetworkAlfaro, Fabian Montealegre / Hytonen, Vesa / Puchko, Oleksandr / Hamalainen, Timo et al. | 2013
- 1252
-
Research on RS(255,223) code in concatenated decoder systemFang, Lei / Zhang, Yu / Zhu, Jun / Yang, Jianxin et al. | 2013
- 1256
-
Spatial-spectral compressive sensing of hyperspectral imageWang, Zhongliang / Feng, Yan / Jia, Yinbiao et al. | 2013
- 1260
-
Comparison of multiuser MIMO systems with MF, ZF and MMSE receiversJu, Meiyan / Qian, Jia / Li, Yueheng / Tan, Guoping / Li, Xujie et al. | 2013
- 1264
-
One speaker recognition method based on feature fusionWang, Jinming / Xu, Yulong / Xu, Zhijun / Ni, Xue et al. | 2013
- 1268
-
OFDM-based selective decode-and-forward relay systems with ordered subcarrier pairingYang, Wendong / Cai, Yueming / Yang, Weiwei / Tu, Jia et al. | 2013
- 1272
-
Joint relay selection, subcarrier pairing and power allocation for OFDM-based cooperative networksYang, Wendong / Cai, Yueming / Kang, Guoqin et al. | 2013
- 1277
-
Visibility analysis of wind turbines applied to assessment of wind farms' electromagnetic impactWang, Xiaoliang et al. | 2013
- 1281
-
Pavement crack image detection algorithm under nonuniform illuminanceXu, Kun / Wei, Na / Ma, Ronggui et al. | 2013
- 1285
-
Parameters identification and mathematical modeling of MEMS gyroscopeJiang, Huhai / Jia, Hongguang / Wei, Qun et al. | 2013
- 1288
-
Scene-based nonuniformity correction with adaptively adjusting integration timeLi, Jing / Cao, Xiaohe / Bin Zhu, / Guang Yang, et al. | 2013
- 1292
-
Design of improved LDPC encoder for CMMB based on SIMD architectureYin, Hang / Du, Weitao / Zhu, Nanhao et al. | 2013
- 1296
-
Weighted energy detection method for spectrum sensing in cognitive radioChen, Xiaoyang / Xia, Weiwei / Bao, Nan / Shen, Lianfeng et al. | 2013
- 1301
-
A k-means clustering algorithm based on the distribution of SIFTLv, Hui / Huang, Xianglin / Yang, Lifang / Liu, Tao / Wang, Ping et al. | 2013
- 1305
-
Tobacco frost-proof wireless temperature data acquisition system based on ARMHuan, Hai / Qiu, Wei / Li, Jian / Zhang, Sijun et al. | 2013
- 1308
-
A fast convergence digital pre-distortion of APSK modulations based on joint algorithmHu, Jingming / Guo, Daoxing et al. | 2013
- 1312
-
Joint angle-frequency estimation based on WSF using Artificial Bee Colony algorithmZhang, Zhicheng / Lin, Jun / Shi, Yaowu et al. | 2013
- 1316
-
Bayer patterned image compression based on APIDCBT-JPEG and all phase IDCT interpolationXie, Songzhao / Wang, Chengyou / Yang, Zhiqiang et al. | 2013
- 1320
-
Transformation functions for FLOC time delay estimation in alpha-stable noisesTian, Yao / Zhang, Li et al. | 2013
- 1326
-
A novel adaptive filter based on FDLMS and modified MFLMSFeng, Yuan / Zhuo, Zhihai / Liu, Shengheng / Xiaokang Cheng, / Letao Zhang, / Zhipeng Zhang, et al. | 2013
- 1330
-
Outage probability and capacity of the K fading channelsXiao, Kun / Lu, Xiansong et al. | 2013
- 1335
-
Frequency domain equalization for multi-h CPM with a training sequenceZhang, Lin / Kan, Chunrong / Dong, Xiaohua / Wang, Naichao / Huang, Mengmeng et al. | 2013
- 1339
-
A dual operating frequency band periodic half-width microstrip leaky-wave antennaDing, Yi / Li, Yuanxin / Tan, Hongzhou / Long, Yunliang et al. | 2013
- 1343
-
Phototropism based weighted cooperative spectrum sensing technologyZhao, Xiaolong / Zhao, Hangsheng / Cao, Long / Jinyong Xu, et al. | 2013
- 1346
-
An effective method of active deception jamming for countering ISARZheng, Guangyong / Wang, Liandong / Zeng, Yonghu et al. | 2013
- 1350
-
Simplified accurate new method for the calculation of the ground-wave in the exponential atmosphereLi, Shengli / Ma, Hengmin / Wang, Zujian et al. | 2013
- 1355
-
A fast dark channel prior-based depth map approximation method for dehazing single imagesHan, Ting / Wan, Yi et al. | 2013
- 1360
-
Bayesian rigid point set registration using logarithmic double exponential priorWu, Jiajia / Wan, Yi / Su, Zhenming et al. | 2013
- 1365
-
SPIHT coded image transmission over underwater acoustic channel with unequal error protection using HQAMEsmaiel, Hamada / Jiang, Danchi et al. | 2013
- 1372
-
Adaptive pattern nulling design of linear array antenna by phase perturbations using invasive weed optimization algorithmWu, Huaning / Liu, Chao / Dai, Yufeng et al. | 2013
- 1375
-
Optimizing hardware cost of motion estimation module for H.264/AVC based on FPGADu, Gaoming / He, Mingliang / Song, Yukun / Zhang, Duoli et al. | 2013
- 1379
-
A UAV 3-D space dynamic path planning in complex battlefield environmentRen, Jia / Du, Wencai / Du, Feng et al. | 2013
- 1384
-
An enhanced approach to physical-layer network codingJiang, Tianming / Yuanyuan Gao, / Wujiang Fang, / Baofeng Yang, / Yanshan Long, et al. | 2013
- 1389
-
A Time-threshold-based Dynamic Priority Scheme for vertical handoff in cellular/WLAN interworkingCai, Jialin et al. | 2013
- 1393
-
Target tracking and measuring based on binocular visionLi, Bo / Xie, Wei et al. | 2013
- 1397
-
An energy-aware routing for cognitive radio ad hoc networksZhang, Yaoran / Song, Fei / Deng, Zhang / Li, Chao et al. | 2013
- 1402
-
Localization based on active learning for cognitive radio networksWang, Huifeng / Gao, Zhan / Yin, Qiao et al. | 2013
- 1406
-
Optimal power and number of cooperation node in cooperative spectrum sensingZhang, Xian / Yun, Zi et al. | 2013
- 1410
-
An investigation of north-south asynchrony of solar filament activity: Wavelet transform analysesYu, Lan / Deng, Linhua / Feng, Song et al. | 2013
- 1414
-
Wavelet analysis in power decomposition of blasting vibration wave signalXiong, Yanfei / Yu, Jiang / Ma, Yanli / Quan, Pu et al. | 2013
- 1417
-
Dielectric -filled rectangular resonator and its application in millimeter wave equalizerLv, Dalong / Zhou, Dongfang / Song, Cuilian / Zhang, Dewei et al. | 2013
- 1420
-
An early warning system in explosion operations based on Wireless Sensor NetworkHu, Yanjun / Wang, Yao / Zhang, Wentao / Xu, Yaohua / Lele Qiu, / Yingguan Wang, et al. | 2013
- 1426
-
Energy and bandwidth efficient wireless sensor communications for improving the energy efficiency of the air interface for Wireless Sensor NetworksDiakite, Laye Hadji / Yu, Li et al. | 2013
- 1430
-
An improved bit-parallel RS encoding algorithm in CMMB systemLin, Ziliang / Zhang, Peng / Liu, Lei et al. | 2013
- 1434
-
Design of mid-wave infrared solid catadioptric optical systemYu, Linyao / Wei, Qun / Jiang, Huhai / Zhang, Tianyi / Wang, Chao / Zhu, Ruifei et al. | 2013
- 1437
-
Robust adaptive beamforming via sparse covariance matrix estimation and subspace projectionSun, Lei / Wang, Huali / Wu, Yanjun / Xu, Guangjie et al. | 2013
- 1442
-
Research of strong interference cancellation techniques in satellite communication systemsYang, Heng / Dang, Junhong / Pan, Yahan / Tong, Jun / Liu, Xin et al. | 2013
- 1447
-
A clustering protocol based on Virtual Area Partition Using Double Cluster Heads scheme for wireless sensor networksMa, Dexin / Ma, Jian / Xu, Pengmin et al. | 2013
- 1451
-
An efficient LDPC encoder based on block-row-cycle structure for CMMBLiu, Lei / Zhang, Peng / Lin, Ziliang et al. | 2013
- 1455
-
Delay performance evaluation for supporting heterogeneous traffic in cognitive radio sensor networksLi, Laikang / Li, Ning / Xie, Wei / Xu, Youyun et al. | 2013
- 1460
-
Single-channel blind separation of MPSK and LFM interference using genetic particle filteringLu, Wei / Zhang, Bangning / Lu, Xiping et al. | 2013
- 1465
-
Performance analysis and optimization of dual-hop MIMO relay system with MIMO-MRC scheme in the presence of co-channel interferenceXu, Xiaoming / Yang, Weiwei / Cai, Yueming et al. | 2013
- 1471
-
Performance analysis of SNR-based hybrid incremental/selection Decode-and-Forward relaying in cooperative networksLi, Guoxin / Chen, Jin / Ren, Chengmeng et al. | 2013
- 1476
-
Performance analysis and hardware design of digital transmitter system base on ZIFJiang, Lanxiang / Yang, Fei et al. | 2013
- 1480
-
Outage probability of multi-source multi-relay wireless networks with co-channel interferenceZhang, Tao / Cai, Yueming / Yang, Weiwei / Wang, Lei et al. | 2013
- 1485
-
Wireless quantum communication networks with mesh structureCao, Yang / Yu, Xutao / Cai, Youxun et al. | 2013
- 1490
-
A modified bistatic point target reference spectrum for bistatic highly squint SAR processingRan, Jinhe / Cao, Lei / Jiang, Hairong / Zhang, Jianyun et al. | 2013
- 1494
-
Design of a wind energy harvesting wireless sensor nodeWu, Yin / Liu, Wenbo / Zhu, Yongjun et al. | 2013
- 1498
-
The clutter suppression based on FA and image contrast in TWI applicationZhang, Lanzi / Lu, Biying / Zhou, Zhimin / Sun, Xin et al. | 2013
- 1503
-
Three-dimensional imaging for UWB though-the-wall radarZhao, Yang / Lu, Biying / Sun, Xin et al. | 2013
- 1507
-
Performance analysis for heterogeneous cellular networks based on Matern-like point process modelRen, Chengmeng / Zhang, Jianfeng / Wei Xie, / Dongmei Zhang, et al. | 2013
- 1512
-
Adaptive key generation based on quantization of channel characteristicsDai, Qiao / Liang, Jin / Huang, Kaizhi et al. | 2013
- 1518
-
Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systemsWang, Yubo / Wang, Chenggui / Li, Chao / Wu, Ducheng et al. | 2013
- 1522
-
An improved wideband digital baseband conversion methodJiang, Kun / Wang, Yuanqin / Lian, Xin / Ma, Hong et al. | 2013
- 1526
-
Dual-antenna based blind hostile jamming suppression and multi-user detection scheme for ds-cdma systems with unknown hostile jammingZhang, Jiang / Zhang, Hang et al. | 2013
- 1531
-
Video de-noising and parallel implementation for full HD video conferencingWang, Yunlong / Zhang, Xuan / Yang, Jiahai et al. | 2013
- 1535
-
A novel key derivation method for eavesdropper in LTE systemPeng, Jianhua / Zhang, Wenjian / Huang, Kaizhi et al. | 2013
- 1540
-
Physical-layer security based on joint scrambling with spatial and frequency resourceLi, Mingliang / Huang, Kaizhi / Zhong, Zhou et al. | 2013
- 1545
-
A soft fast estimation method of PN sequence based on weighting Walsh Hadamard TransformHuang, Kaizhi / Chen, Song / Yang, Meiyue et al. | 2013
- 1551
-
A polynomial estimation algorithm for PN sequence based on reliability accumulationYang, Meiyue / Huang, Kaizhi / Luo, Wenyu et al. | 2013
- 1557
-
A cooperative jamming based security algorithm for multi-user MIMO systemsSong, Huawei / Yang, Meiyue / Xu, Xiangyang / Luo, Wenyu et al. | 2013
- 1561
-
A partial CSI based Affinity propagation Dynamic clustering algorithmRan, Xiaomin / Tong, Min / Mo, Youquan et al. | 2013
- 1567
-
Data-aided frequency recovery for SOQPSK signals based on the PAM representationWang, Yonggang / Liu, Aijun / Zhao, Kun / Wang, Heng / Zhang, Yingxian et al. | 2013
- 1571
-
Eavesdropping against artificial noise: Hyperplane clusteringLiu, Lu / Liang, Jin / Huang, Kaizhi et al. | 2013
- 1576
-
Research on service scheme in IP multimedia subsystem networkWang, Yafang / Zheng, Xiaozhe / Guan, Lifang et al. | 2013
- 1580
-
Simulation of CSS communication system in VLF atmospheric noiseWu, Yanjun / Wang, Huali / Sun, Lei / Xu, Guangjie et al. | 2013
- 1584
-
A multicarrier-based physical layer security scheme for the multicast systemsLin, Tong / Huang, Kai-Zhi / Luo, Wen-Yu et al. | 2013
- 1588
-
Multi-object tracking based on improved Mean ShiftGao, Meifeng / Liu, Di et al. | 2013
- 1593
-
Moving detection technology for vehicle speed based on pseudorandom code phase modulationLi, Guangming / Huang, Lianhua et al. | 2013
- 1596
-
Image transmission over underwater acoustic environment using OFDM technique with HQAM mapperEsmaiel, Hamada / Jiang, Danchi et al. | 2013
- 1602
-
Design and implementation of voice signal processing system based on DSP and FPGAZhang, Wei / Wu, Diancheng / Xue, Zhiyuan / Zhang, Tiejun / Wang, Donghui / Hou, Chaohuan et al. | 2013
- 1606
-
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanismXu, Xiangyang / Luo, Wenyu / Song, Huawei / Zhang, Lizhi et al. | 2013
- 1610
-
Performance enhanced GFSK demodulator using phase-domain ADC for zero-IF receiversLiu, Jinjia / Yu, Fengqi et al. | 2013
- 1614
-
A second-order spatial hopping transmission scheme for physical layer securityJi, XinSheng / Kang, XiaoLei / Huang, KaiZhi / KeMing Ma, et al. | 2013
- 1620
-
Analysis on carrier delay ambiguity resolving in Connected Elements InterferometryLu, Weitao / Yang, Wenge / Hong, Jiacai et al. | 2013
- 1625
-
An image fusion algorithm based on shearletWang, Hongzhi / Liu, Yan / Xu, Shupeng et al. | 2013
- 1629
-
Vector quantization image coding based on biorthogonal wavelet transform and improved SOFMXie, Songzhao / Wang, Chengyou / Cui, Chao et al. | 2013
- 1633
-
SVD-based method for DOA estimation in the presence of mutual couplingQu, Yi / Zhang, Jian et al. | 2013
- 1637
-
Research of image segmentation algorithm applied to concrete bridge cracksXu, Hongke / Tian, Yuan / Lin, Shan / Wang, Shichao et al. | 2013
- 1641
-
Analysis on reliability of acoustic features for material recognition of damped impacted platesZhang, Bingrui / Chen, Kean / Liang, Yong et al. | 2013
- 1645
-
Wideband beamforming with broad nulls of nested arrayLuo, Jun / Huang, Longyang et al. | 2013