Digital Library
Vol. 8, No. 7, July 28, 2014
[Regular Papers]
Internet & Communications



- Secure MQAM scheme
- signal constellation hopping (SCH)
- amplitude distortion (AD) factor
- phase hopping (PH) factor
- secrecy gain

- Application-Level Traffic Classification
- Application identification
- Statistical Signature
- Signature-based Classification
- Statistics-based Classification

- Adaptive Pricing
- Nash equilibrium
- Non cooperative power control game
- SINR
- Transmission Power
- Wireless ad hoc networks.





- Scarcity heuristic
- Social Commerce
- momentary characteristic
- persistent attribute
- scarcity of time
- scarcity of quantity
- provisional coupon
Multimedia



- Depth Image-Based Rendering (DIBR)
- Linear depth quantization
- Domain division depth quantization
- multiview intermediate image generation
- 3D Display


- multi-view video
- compression coding
- multi-view video coding
- temporal correlation
- inter-view correlation
- prediction


Internet Security

- denial-of-service (DoS) attacks
- application layer DoS attack
- admission control
- busy period
- attack flow detection
- Bloom Filter

- cryptography
- Privacy/Authorization/Authentication
- Certificateless Identification
- standard model
- proof of security


Archives