Digital Library
Vol. 8, No. 12, December 30, 2014
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cyber-Physical Systems
- Embedded Computing Technologies
- Physically-aware Engineered Systems
- Model-Based Design
- System-Level Requirements.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- energy-efficient routing
- Adaptive Radio Interface Selection
- Heterogeneous Sensor Networks
- Network Optimization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Bandwidth re-allocation
- Intervenient Stackelberg game
- Bargaining strategies
- Iterative feedback approach
- Hierarchical wireless network system.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Degrees of Freedom
- Y channel
- single-antenna users
- asymmetric signal space alignment
- beamforming optimization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- finite-state Markov channel (FSMC)
- code-division multiple access (CDMA)
- unslotted ALOHA
- queueing analysis
- Doppler frequency offset
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- energy-efficient routing
- Adaptive Radio Interface Selection
- Heterogeneous Sensor Networks
- Network Optimization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- lane detection
- advanced driver assistance system
- feature extraction
- machine vision
- Intelligent Transportation System
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Image authentication, absolute moment block truncation coding (AMBTC), data hiding, tamper detection
- Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Casper
- CSP
- Kerberos
- Key-Exchange Protocol
- Key Renewal
- Network Security
- Rank Functions
- Timed Authentication Protocols
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Body Area Network
- integrity authentication
- reversible watermark
- histogram shifting
- Lightweight
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives