Digital Library
Vol. 13, No. 5, May 30, 2019
[Regular Papers]
Internet & Communications
10.3837/tiis.2019.05.001
10.3837/tiis.2019.05.002
10.3837/tiis.2019.05.003
10.3837/tiis.2019.05.004
- Target localization
- Multipath environment
- Data association
- Expectation maximization
- Distributed implementation
- Average consensus
10.3837/tiis.2019.05.005
- Small Cell Networks (SCNs)
- Pre-caching Technology
- Internet Content Providers (ICPs)
- Bankruptcy Game
- Analytic Hierarchy Process (AHP)
10.3837/tiis.2019.05.006
- Reliability, expression of reliability, I.E principle
- vehicular ad-hoc networks, headway distance, freeway highway, universal speed factor
10.3837/tiis.2019.05.007
10.3837/tiis.2019.05.008
- Top-N recommendation
- Collaborative Filtering (CF)
- learning to rank (LTR)
- Mean Average Precision (MAP)
- implicit feedback
10.3837/tiis.2019.05.009
- distributed compressive sensing (DCS)
- adaptive matching pursuit
- doubly-selective fading channel
- basis expansion model (BEM)
- channel estimation
10.3837/tiis.2019.05.010
- 3D laser radar
- laser triangulation
- distance measurement
- weighted average algorithm
- 3D reconstruction
10.3837/tiis.2019.05.011
10.3837/tiis.2019.05.012
- Direct position determinations(DPD)
- Nested array
- distributed source
- Compressed sensing
- vectorization
10.3837/tiis.2019.05.013
- Low-energy adaptive clustering hierarchy (LEACH) protocol
- bat algorithm
- Curve decline strategy
- Triangle-flipping strategy
10.3837/tiis.2019.05.014
- Online communications
- comments and reactions
- media consumers
- willingness to watch
- distinction bias
- behavioral economics
Multimedia
10.3837/tiis.2019.05.015
- license plate recognition
- license plate structure classification
- multi-style license plate
- k-nearest neighbor
10.3837/tiis.2019.05.016
10.3837/tiis.2019.05.017
10.3837/tiis.2019.05.018
10.3837/tiis.2019.05.019
Internet Security
10.3837/tiis.2019.05.020
- homomorphic encryption
- digital speech signal
- secure speech storing
- less data expansion
- Cloud computing
10.3837/tiis.2019.05.021
10.3837/tiis.2019.05.022
- Fully homomorphic encryption
- Ciphertext Matrix
- Ciphertexts Stack
- Decryption Structure
- Concert Parameters
10.3837/tiis.2019.05.023
10.3837/tiis.2019.05.024
- password authentication
- targeted password attacking
- BiLSTM
- probabilistic context-free grammar
- Markov chain
- Personal Information
10.3837/tiis.2019.05.025
- Image secrecy
- Multi-stage encryption
- Visual cryptography
- One time pad
- Steganography
- Least Significant Bit
10.3837/tiis.2019.05.026
- Ciphertext-policy attribute-based encryption
- conjunctive keyword search
- Secure channel
- Keyword-guessing attacks
- Search policy
10.3837/tiis.2019.05.027
- Wireless Sensor Network
- artificial immune
- Intrusion Detection
- danger theory
- Genetic Algorithms
- Security
10.3837/tiis.2019.05.028
10.3837/tiis.2019.05.029
Archives