Browse > Article List

논문
1 A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing
Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan; / Korean Society for Internet Information , v.11, no.4, pp.1820-1840,
2 Interference Mitigation Scheme for Device-to-Device MIMO Communications Underlaying a Cellular Network
Nam, Yujin;So, Jaewoo;Kim, Jinsung; / Korean Society for Internet Information , v.11, no.4, pp.1841-1865,
3 Heterogeneity-aware Energy-efficient Clustering (HEC) Technique for WSNs
Sharma, Sukhwinder;Bansal, Rakesh Kumar;Bansal, Savina; / Korean Society for Internet Information , v.11, no.4, pp.1866-1888,
4 An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis
Nguyen, Xuan Xinh;Do, Dinh-Thuan; / Korean Society for Internet Information , v.11, no.4, pp.1889-1910,
5 Resilient Routing Overlay Network Construction with Super-Relay Nodes
Tian, Shengwen;Liao, Jianxin;Li, Tonghong;Wang, Jingyu;Cui, Guanghai; / Korean Society for Internet Information , v.11, no.4, pp.1911-1930,
6 On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks
Yin, Bo;Zhou, Siwang;Zhang, Shiwen;Gu, Ke;Yu, Fei; / Korean Society for Internet Information , v.11, no.4, pp.1931-1953,
7 A Low-Complexity CLSIC-LMMSE-Based Multi-User Detection Algorithm for Coded MIMO Systems with High Order Modulation
Xu, Jin;Zhang, Kai; / Korean Society for Internet Information , v.11, no.4, pp.1954-1971,
8 Regional Science and Technology Resource Allocation Optimization Based on Improved Genetic Algorithm
Xu, Hao;Xing, Lining;Huang, Lan; / Korean Society for Internet Information , v.11, no.4, pp.1972-1986,
9 Self-Adaptive Termination Check of Min-Sum Algorithm for LDPC Decoders Using the First Two Minima
Cho, Keol;Chung, Ki-Seok; / Korean Society for Internet Information , v.11, no.4, pp.1987-2001,
10 Transient Multipath routing protocol for low power and lossy networks
Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir; / Korean Society for Internet Information , v.11, no.4, pp.2002-2019,
11 Dynamic Adjustment Strategy of n-Epidemic Routing Protocol for Opportunistic Networks: A Learning Automata Approach
Zhang, Feng;Wang, Xiaoming;Zhang, Lichen;Li, Peng;Wang, Liang;Yu, Wangyang; / Korean Society for Internet Information , v.11, no.4, pp.2020-2037,
12 Particle Swarm Optimization based on Vector Gaussian Learning
Zhao, Jia;Lv, Li;Wang, Hui;Sun, Hui;Wu, Runxiu;Nie, Jugen;Xie, Zhifeng; / Korean Society for Internet Information , v.11, no.4, pp.2038-2057,
13 User Association and Base Station Sleep Management in Dense Heterogeneous Cellular Networks
Su, Gongchao;Chen, Bin;Lin, Xiaohui;Wang, Hui;Li, Lemin; / Korean Society for Internet Information , v.11, no.4, pp.2058-2074,
14 Viewpoint Invariant Person Re-Identification for Global Multi-Object Tracking with Non-Overlapping Cameras
Gwak, Jeonghwan;Park, Geunpyo;Jeon, Moongu; / Korean Society for Internet Information , v.11, no.4, pp.2075-2092,
15 Recognizing Actions from Different Views by Topic Transfer
Liu, Jia; / Korean Society for Internet Information , v.11, no.4, pp.2093-2108,
16 Sparse Representation based Two-dimensional Bar Code Image Super-resolution
Shen, Yiling;Liu, Ningzhong;Sun, Han; / Korean Society for Internet Information , v.11, no.4, pp.2109-2123,
17 A Noisy-Robust Approach for Facial Expression Recognition
Tong, Ying;Shen, Yuehong;Gao, Bin;Sun, Fenggang;Chen, Rui;Xu, Yefeng; / Korean Society for Internet Information , v.11, no.4, pp.2124-2148,
18 Vulnerable Path Attack and its Detection
She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong; / Korean Society for Internet Information , v.11, no.4, pp.2149-2170,
19 Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems
Oh, Hyun-Kyo;Kim, Sang-Wook; / Korean Society for Internet Information , v.11, no.4, pp.2171-2195,
20 An SDN based hopping multicast communication against DoS attack
Zhao, Zheng;Liu, Fenlin;Gong, Daofu; / Korean Society for Internet Information , v.11, no.4, pp.2196-2218,
21 Provably-Secure Public Auditing with Deduplication
Kim, Dongmin;Jeong, Ik Rae; / Korean Society for Internet Information , v.11, no.4, pp.2219-2236,
22 An Improved Cancelable Fingerprint Template Encryption System Research
Wang, Feng;Han, Bo;Niu, Lei;Wang, Ya; / Korean Society for Internet Information , v.11, no.4, pp.2237-2253,
23 Efficient and Secure Certificateless Proxy Re-Encryption
Liu, Ya;Wang, Hongbing;Wang, Chunlu; / Korean Society for Internet Information , v.11, no.4, pp.2254-2275,
24 UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk
Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying; / Korean Society for Internet Information , v.11, no.4, pp.2276-2291,
25 Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE
Chen, Zehong;Zhang, Peng;Zhang, Fangguo;Huang, Jiwu; / Korean Society for Internet Information , v.11, no.4, pp.2292-2309,