Digital Library
Vol. 8, No. 12, December 30, 2014
[Regular Papers]
Internet & Communications
10.3837/tiis.2014.12.001
- Cyber-Physical Systems
- Embedded Computing Technologies
- Physically-aware Engineered Systems
- Model-Based Design
- System-Level Requirements.
10.3837/tiis.2014.12.002
- energy-efficient routing
- Adaptive Radio Interface Selection
- Heterogeneous Sensor Networks
- Network Optimization
10.3837/tiis.2014.12.003
- Bandwidth re-allocation
- Intervenient Stackelberg game
- Bargaining strategies
- Iterative feedback approach
- Hierarchical wireless network system.
10.3837/tiis.2014.12.004
- Degrees of Freedom
- Y channel
- single-antenna users
- asymmetric signal space alignment
- beamforming optimization
10.3837/tiis.2014.12.005
- finite-state Markov channel (FSMC)
- code-division multiple access (CDMA)
- unslotted ALOHA
- queueing analysis
- Doppler frequency offset
10.3837/tiis.2014.12.006
10.3837/tiis.2014.12.007
10.3837/tiis.2014.12.008
10.3837/tiis.2014.12.009
10.3837/tiis.2014.12.010
10.3837/tiis.2014.12.011
10.3837/tiis.2014.12.012
- energy-efficient routing
- Adaptive Radio Interface Selection
- Heterogeneous Sensor Networks
- Network Optimization
10.3837/tiis.2014.12.013
Multimedia
10.3837/tiis.2014.12.014
- lane detection
- advanced driver assistance system
- feature extraction
- machine vision
- Intelligent Transportation System
10.3837/tiis.2014.12.015
10.3837/tiis.2014.12.016
10.3837/tiis.2014.12.017
Internet Security
10.3837/tiis.2014.12.018
10.3837/tiis.2014.12.019
10.3837/tiis.2014.12.020
- Image authentication, absolute moment block truncation coding (AMBTC), data hiding, tamper detection
- Security
10.3837/tiis.2014.12.021
- Casper
- CSP
- Kerberos
- Key-Exchange Protocol
- Key Renewal
- Network Security
- Rank Functions
- Timed Authentication Protocols
10.3837/tiis.2014.12.022
10.3837/tiis.2014.12.023
- Wireless Body Area Network
- integrity authentication
- reversible watermark
- histogram shifting
- Lightweight
10.3837/tiis.2014.12.024
Archives