Digital Library
Vol. 9, No. 7, July 30, 2015
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Multipath transport protocol
- SCTP
- Concurrent Multiple Transfer
- cooperative communication
- load balancing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Multiple preparation
- multiple criteria
- handover parameters
- Fuzzy logic control
- ping pong handover
- handover failure
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Differential space-time block code (DSTBC)
- ultra-wideband (UWB)
- multiple symbol detection (MSD)
- a posteriori probabilities (APP)
- soft-input soft-output (SISO).
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Bag of Visual Words Method
- Probabilistic Latent Semantic Analysis
- K-L divergence
- Chi-Square Model
- Object Category
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Public cloud storage
- encrypted data sharing
- certificate-based proxy re-encryption
- random oracle model
- chosen-ciphertext security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Android
- Mobile Malware
- Malware detection
- system call sequence
- Artificial neural network
- co-occurrence matrix
Archives