Digital Library
Vol. 11, No. 6, June 29, 2017
[Regular Papers]
Internet & Communications
10.3837/tiis.2017.06.001
10.3837/tiis.2017.06.002
10.3837/tiis.2017.06.003
10.3837/tiis.2017.06.004
10.3837/tiis.2017.06.005
- WSNs
- constrained relay node deployment
- ABC with a linear local search
- MO optimization
- hypervolume
- coverage of two sets
10.3837/tiis.2017.06.006
10.3837/tiis.2017.06.007
10.3837/tiis.2017.06.008
- Compressed sensing
- Network coding
- compressed network coding
- Wireless Sensor Networks
- Energy-Efficient
10.3837/tiis.2017.06.009
10.3837/tiis.2017.06.010
- Influential spreaders
- influence maximization
- complex networks
- k-core decomposition
- epidemic spreading
10.3837/tiis.2017.06.011
10.3837/tiis.2017.06.012
- power allocation
- integrated data and energy transfer
- sum-throughput
- fair-throughput
- convex optimization.
10.3837/tiis.2017.06.013
10.3837/tiis.2017.06.014
- Ant Colony Optimization (ACO)
- metaheuristics
- multiprocessor task-scheduling problem
- task-graph
- parallel and distributed systems.
Multimedia
10.3837/tiis.2017.06.015
10.3837/tiis.2017.06.016
- Electronic image stabilization
- antiblurry dejitter
- Feature detection
- evaluation criterion
- binary feature description
10.3837/tiis.2017.06.017
10.3837/tiis.2017.06.018
10.3837/tiis.2017.06.019
10.3837/tiis.2017.06.020
10.3837/tiis.2017.06.021
- Vehicle Personal Recorder
- Car License Plate Extraction
- Contrast Enhancement
- Cumulative Distribution Function
- Computer Vision Sytems
10.3837/tiis.2017.06.022
Internet Security
10.3837/tiis.2017.06.023
10.3837/tiis.2017.06.024
- Mobile Cloud Computing
- Ciphertext-policy attribute-based encryption
- Access policy
- Verifiable
- Outsourced computation
10.3837/tiis.2017.06.025
Archives