Digital Library
Vol. 12, No. 8, August 30, 2018
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cloud computing
- cloud task scheduling
- symbiotic organisms search
- simulated annealing
- chaotic local search
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless powered
- buffer-aided
- mode selection and power allocation
- throughput-delay tradeoff
- Lyapunov optimization.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- High utility itemsets
- uncertain datasets
- quantum genetic algorithm
- High potential utility itemsets
- HPUIM-QGA
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Indoor Localization
- pedestrian dead reckoning
- Bluetooth
- received signal strength
- probabilistic voting
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- CPM-QC-LDPC code
- CPM-RID decoding algorithm
- Neural Network
- weights
- bit error rate
- frame error rate
- convergence rate
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Semi-supervised deep hashing
- binary hashing
- convolutional auto-encoders
- Deep Learning
- image semantics
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Machine Learning
- Quality Representation Classification
- HTTPS Video Streaming
- Encrypted traffic
- YouTube
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Non-control-data attacks
- influence domain
- security-critical non-control-data set (SCNS)
- memory corruption vulnerability
- Instrumentation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Papers on ICONI 2017
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Massive Open Online Courses (MOOCs)
- Task-Technology Fit
- IS Continuance
- Utilization
- perceived usefulness
- user satisfaction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Network intrusion detection systems
- Anomaly Detection
- bulk synchronous parallel
- BSP
- Big data
- Machine Learning
- DARPA
- KDD Cup 99
- ISCX-UNB dataset
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Computationl Thinking
- Software Education
- Algorithms and Procedures
- Learner Satisfaction
- Self-Efficacy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives