1 |
Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture
|
Lirong Jiang
|
4268~4290
|
0
|
2 |
Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: A Hierarchical Learning Framework
|
Youming Sun
|
4291~4310
|
11
|
3 |
Topology-based Workflow Scheduling in Commercial Clouds
|
Haoran Ji
|
4311~4330
|
1
|
4 |
Dynamic Access and Power Control Scheme for Interference Mitigation in Femtocell Networks
|
Mujeeb Ahmed
|
4331~4346
|
1
|
5 |
Adaptive Application Component Mapping for Parallel Computation Offloading in Variable Environments
|
Wenhao Fan
|
4347~4366
|
0
|
6 |
ENC-MAC: Energy-efficient Non-overlapping Channel MAC for Cognitive Radio enabled Sensor Networks
|
김보성
|
4367~4386
|
3
|
7 |
Energy Efficiency Resource Allocation for MIMO Cognitive Radio with Multiple Antenna Spectrum Sensing
|
Bing Ning
|
4387~4404
|
0
|
8 |
Cooperative and Competitive Effect in Heterogeneous Networks of Healthcare System
|
Xiaoshuang Liu
|
4405~4418
|
0
|
9 |
Two-Step Scheduling Scheme to Support Fairness and QoS in DVB-S2 System
|
박만규
|
4419~4435
|
0
|
10 |
Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer
|
Minglei Shu
|
4436~4452
|
1
|
11 |
Base Station Placement for Wireless Sensor Network Positioning System via Lexicographical Stratified Programming
|
Jun Yan
|
4453~4468
|
1
|
12 |
Outage Performance for DF Two-Way Relaying with Co-Channel Interference over Nakagami- m Fading
|
Jinhong Fan
|
4469~4482
|
2
|
13 |
Robust Cooperative Relay Beamforming Design for Security
|
Xiangwu Gong
|
4483~4501
|
0
|
14 |
Local Similarity based Discriminant Analysis for Face Recognition
|
Xinguang Xiang
|
4502~4518
|
2
|
15 |
Rate Adaptation for HTTP Video Streaming to Improve the QoE in Multi-client Environments
|
윤두열
|
4519~4533
|
3
|
16 |
Object Cataloging Using Heterogeneous Local Features for Image Retrieval
|
Mohammad Khairul Islam
|
4534~4555
|
1
|
17 |
Chaotic Features for Dynamic Textures Recognition with Group Sparsity Representation
|
Xinbin Luo
|
4556~4572
|
0
|
18 |
A Novel Recognition Algorithm Based on Holder Coefficient Theory and Interval Gray Relation Classifier
|
Jingchao Li
|
4573~4584
|
9
|
19 |
Buffer-Based Adaptive Bitrate Algorithm for Streaming over HTTP
|
Waqas ur Rahman
|
4585~4603
|
7
|
20 |
Image deblurring via adaptive proximal conjugate gradient method
|
Han Pan
|
4604~4622
|
1
|
21 |
Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper’s Information
|
Tran Trung Duy
|
4623~4643
|
6
|
22 |
A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction
|
Jeevaa Katiravan
|
4644~4661
|
3
|
23 |
New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology
|
이호재
|
4662~4679
|
2
|
24 |
Efficient Anonymous Broadcast Encryption with Adaptive Security
|
Fu-Cai Zhou
|
4680~4700
|
4
|
25 |
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks
|
Anjali Anand
|
4701~4719
|
0
|
26 |
Implementation of a Network Provisioning System with User-driven and Trusty Protection Management
|
임헌국
|
4720~4738
|
0
|