Digital Library
Vol. 11, No. 9, September 29, 2017
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cooperative communication
- Energy Harvesting
- infinite markov chain
- finite markov chain
- two-step selection
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cellular heterogeneous network
- coalitional game
- Energy Harvesting
- interference management
- time sharing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- maximum likelihood
- automatic lexicon generation
- intelligent personal assistant (IPA)
- out-of-lexicon (OOL)
- speech recognition
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cloud computing
- Federated Clouds Resource Provisioning
- Research Challenges in the Cloud
- Service Level Agreement
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- charging productivity
- sector-based charging schedule
- rechargeable wireless sensors network
- mobile charger
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cooperative relaying
- relay selection
- Power Efficiency
- quantum bee colony optimization
- non-dominated sorting quantum bee colony optimization
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- compressive sensing, secure wireless localization, received signal strength, attacked measurement
- wireless network
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- image annotation
- semantic and visual neighbors
- k-nearest neighbor
- Semantic similarity
- visual similarity
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Dynamic gesture recognition
- adaptive linear extrapolation
- longest common subsequence (LCS)
- velocity information
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Facial gender recognition
- low-rank decomposition
- Collaborative Representation
- unconstrained environment
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- facial expression recognition
- multiscale adaptive local directional texture pattern
- facial descriptor
- Gabor filters
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Image tamper detection
- copy-move forgery detection
- discrete cosine transform (DCT)
- main transfer vector
- lexicographical sort
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Named Data Networking (NDN)
- Malicious Data Aggregates (MDA)
- Interest Flooding Attack (IFA)
- Network Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Android malware detection
- Feature selection
- joint features
- Particle Swarm Optimization
- regularization
Archives