Digital Library
Vol. 4, No. 5, October 29, 2010
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cognitive multi-user OFDM
- rate adaptive
- margin adaptive
- geometric progression
- linear water-filling
- service outage probability
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Mobile web service
- XML
- web service repository
- handheld flexible representation (HHFR)
- web service framework
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Traffic monitoring and analysis
- Traffic Classification
- P2P traffic analysis
- Support Vector Machine
- attribute subset selection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- IEEE 802.11
- WLAN
- medium access control (MAC)
- distributed coordination function (DCF)
- contention window (CW) optimization
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Dijkstra’s algorithm
- path-finding
- shortest path container
- Pruning Method
- minimum bounding rectangle
- convex hull
- border-line
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- String matching
- Aho-Corasick algorithm
- parallel processing structure
- Intrusion Detection System
- SNORT
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cryptography
- Provable Security
- Identity Based Encryption
- hierarchical identity based encryption
- Anonymity
- bilinear pairing
Archives