Digital Library
Vol. 12, No. 4, April 29, 2018
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Device-to-Device (D2D)
- Signal to Interference-plus-Noise Ratio (SINR)
- D2D-Access Probability
- Sum Throughput.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- interference mitigation
- cognitive heterogeneous networks
- spectrum sensing
- Resource Allocation
- Lagrange multiplier method
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- simplified matrix inversion
- classical iterative method
- minimum mean square error
- signal detection
- Massive MIMO
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cognitive Radio Networks
- Cooperative communications
- physical layer security
- matching algorithm
- SECCC
- spectrum access strategy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Spatiotemporal correlations
- data gathering
- Compressive sensing
- Wireless Sensor Networks
- Kronecker product.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- RFID networks
- framed and slotted ALOHA
- tag cognizance scheme
- exact expression for tag cognizance rate
- nearly optimal value for probability of seizing an opportunity
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Data warehousing
- information systems
- star schema
- fact table
- OLAP
- analytical workloads
- multi-level partitioning
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Face Recognition
- Weber Symmetric Local Graph Structure
- Local Graph Structure
- Weber Local Descriptor
- local binary pattern
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Malware detection
- detection mechanism
- API call fragments
- homomorphic encryption
- privacy-preserving Naive Bayes classifier
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Papers on APIC-IST 2017
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Music genre classification
- music sample analysis
- MIDI analysis
- Korean traditional music
- music editor
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives