default search action
ComComAP 2014: Beijing, China
- IEEE Computers, Communications and IT Applications Conference, ComComAP 2014, Beijing, China, October 20-22, 2014. IEEE 2014, ISBN 978-1-4799-4813-0
- Qingsong Cai, Yuqing Bai, Limin Sun, Jianwei Niu:
Quantifying individual communication capability in opportunistic mobile social networks. 1-6 - Chao Tong, Zhongyu Xie, Xiaoyun Mo, Jianwei Niu, Yan Zhang:
Detecting overlapping communities of weighted networks by central figure algorithm. 7-12 - Hailong Zhang, Xiao Guo, Jinyao Yan, Bo Liu, Qianjun Shuai:
SDN-based ECMP algorithm for data center networks. 13-18 - Mir Yasir Umair, Kopparapu Venkata Ramana, Dongkai Yang:
An enhanced K-Nearest Neighbor algorithm for indoor positioning systems in a WLAN. 19-23 - Kai Zhao, Huijuan Cui, Kun Tang:
A novel UEP resource allocation scheme for layered source transmission in COFDM systems. 24-29 - Ming Sun, Hai Wei:
Study on B2M integrated information service platform combined with RFID technology in Medicine circulation field. 30-33 - Shanshan Wan, Zhendong Niu:
Adaptive Learning Objects Assembly with compound constraints. 34-39 - Xue Xiao, Shufang Wang:
Equalization-based enterprise service selection. 40-45 - Yiding Wang, Di Zhang, Xiaoyu Zhang, Wenqi Wu:
High-temperature electrode faulted diagnosis for copper electrolytic cell. 46-49 - Gangyong Jia, Guangjie Han:
Combine dynamic time-slice scaling with DVFS for coordinating thermal and fairness on CPU. 50-55 - Zhao Kai, Huijuan Cui, Tang Kun:
Optimized Bit Extraction of H.264-SVC MGS stream over error-prone channels. 56-61 - Jianzhong Qi, Feixiang Luo, Qingping Song:
Fast acquisition method of navigation receiver based on folded PMF-FFT. 62-66 - Jinpeng Chen, Yu Liu, Ming Zou:
From tie strength to function: Home location estimation in social network. 67-71 - Meng-meng Miao, Jun Sun, Shixiang Shao:
Cross-layer optimization schemes based on HARQ for Device-to-Device communication. 72-77 - Pingyan Shi, Zhenguo Shi, Xiaofeng Tao, Jianchao Ji, Xiaohui Liu:
Design of Rake receiver for the multi-path DS-UWB system. 78-83 - Yan Zhang, Fengfan Yang:
The performance analysis of QC-LDPC codes constructed by Dayan sequence for coded cooperative relay. 84-88 - Xiong Li, Junguo Liao, Jiao Zhang, Jianwei Niu, Saru Kumari:
A secure remote user mutual authentication scheme using smart cards. 89-92 - Yu Liu, Jianwei Niu:
Overlapped-shaking: A local authentication method for mobile applications. 93-97 - Adnan A. Farooqui, Syed Sajjad Haider Zaidi, Attaullah Y. Memon, Sameer Qazi:
Cyber Security Backdrop: A SCADA testbed. 98-103 - Chen Xiao, Tiemeng Li, Nan Yang, Lifeng Wang, Shilong Ma:
A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints. 104-109 - Xuebin Ma, Zhenchao Ouyang, Lin Bai, Xin Zhan, Xiangyu Bai:
An overlapping community detection algorithm for opportunistic networks. 110-115 - Yubo Deng, Wei Liu, Lei Zhang, Yongping Xiong, Yunchuan Sun:
Path prediction based on second-order Markov chain for the opportunistic networks. 116-120 - Shaobo Wu, Jianwei Niu, Long Cheng, Wusheng Chou:
Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networks. 121-126 - Zhu Tang, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu:
Software defined satellite networks: Benefits and challenges. 127-132 - Chenfei Zhang, Lei Lei, Ting Zhang:
Analyzing the cumulative interfering noise in multi-hop IEEE 802.11 networks. 133-136 - Long Zhang, Liusheng Huang, Hongli Xu:
Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networks. 137-142 - Mohammed I. Alghamdi, Xunfei Jiang, Xiao Qin, Jifu Zhang, Minghua Jiang, Meikang Qiu:
TOPS: Two-phase scheduling for distributed real-time systems. 143-148 - Long Cao, Xin Chen, Yuqing Zhang, Donghui Li:
Hot topics detected from micro-bloggings based on word co-occurrence model. 149-154 - Boxue Wang, Xinhuai Tang:
Designing a self-adaptive and context-aware service composition system. 155-160 - Lei Han, Yi Lin, Weiwei Jia:
A new I/O scheduler designed for SSD through exploring performance characteristics. 161-166 - Zhengping Li, Didi Zhang, Jin Ren, Changliu Niu, Jucheng Zhao, Baotong An, Yihua Meng:
Improved dynamic channel allocation algorithm based on ant colony intelligence for P2P service. 167-172 - Jianwen Sun, Xiang Long, Han Wan, Jingwei Yang:
A checkpointing and instant-on mechanism for a embedded system based on non-volatile memories. 173-178 - Yiding Wang, He Gong, Yun Fan, Haijun Cao:
Design of a distributed wireless tree-like data acquisition system based on ZigBee. 179-184 - Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene, Guangjie Han, Jianwei Niu:
Improving the data processing in WSNs through combination of a distributed approach and statistical techniques. 185-190 - Li Xu, Guozhen Tan, Xia Zhang:
A cost sensitive approach for Virtual Network reconfiguration. 191-196 - Yang Yang, Nannan Cheng:
A highway vehicle anti-collision protocol based on broadcasting feedback mechanism. 197-201 - Jin Ren, Zhengping Li, Yujie Guo:
Iterative detection and decoding of MIMO signal using a low-complexity soft-output detector. 202-205 - Yiding Wang, Qi Qi, Kefeng Li:
Liveness detection of dorsal hand vein based on AutoRegressive model. 206-210 - Xue Qiu, Shuguang Wang, Qiong Jia, Chunhe Xia, Qingxin Xia:
An automated method of penetration testing. 211-216 - Xue Wu, Chao Liu, Qingxin Xia:
Safety requirements modeling based on RUCM. 217-222 - Mustafa Muwafak Alobaedy, Ku Ruhana Ku-Mahamud:
Scheduling jobs in computational grid using hybrid ACS and GA approach. 223-228 - Xiang Zheng, Fang Xiong, YaoNan Dai:
The technical exploration of implementing hybrid TV with cloud computing in radio and TV industry. 229-233 - Chen Xiao, Wendong Wang, Nan Yang, Lifeng Wang:
A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system. 234-238 - Yunchuan Sun, Junsheng Zhang, Rongfang Bie, Hongli Yan, Ye Xia, Zhangbing Zhou:
Event-based organization model for sensing data. 239-242 - Pengfei Li, Qi Meng, Weihong Zhang:
Estimation of the number of crop seeds based on image identification. 243-248 - Di Li, Jianwei Niu, Meikang Qiu, Meiqin Liu:
Sentiment analysis on Weibo data. 249-254 - Yanwen Wang, Xiaoyu Li, Xiaoling Wu, Zhangbing Zhou, Hainan Chen:
Horizontal hierarchy slicing based data compression for WSN. 255-260 - Bing Zhou, Yanjie Zhou, Mingliang Xu, Fei Wu:
Computation-aware motion estimation algorithm based on QoE control. 261-265 - Chaoqing Ma, Ou-Bong Gwun, Seung-Han Jeong:
3D simulation of primary thrombus formation based on Level Set Methods. 266-270 - Zehui Cheng, Beibei Yao, Xiaolei Wang, Zhangbing Zhou:
Web service sub-chain recommendation leveraging graph searching. 271-275 - Teng Long, Wenhui Zhang:
Termination analysis with recursive calling graphs. 276-282 - Jinyang Liu, Chuanlei Zhang, Shanwen Zhang, Weidong Fang:
An efficient and accurate optimization method of sliding window size for PAA. 283-286 - Ying Li, Jianwei Niu, Xiang Long, Meikang Qiu:
Energy efficient scheduling with probability and task migration considerations for soft real-time systems. 287-293 - Weihong Zhang, Yong Chen:
Bayes topic prediction model for focused crawling of vertical search engine. 294-299 - Chao Wang, Jucheng Yang, Yarui Chen, Cao Wu, Yanbin Jiao:
Image latent semantic analysis based face recognition with ensemble extreme learning machine. 300-304 - Qingxin Xia, Yuqing Lan, Liang Zhao, Limin Xiao:
Energy-saving analysis of Cloud workload based on K-means clustering. 305-309 - Donghui Li, Yuqing Zhang, Xin Chen, Long Cao:
Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research. 310-315 - Bassem Khalfi, Mahdi Ben Ghorbel, Bechir Hamdaoui, Mohsen Guizani:
Optimal power allocation for smart-grid powered point-to-point cognitive radio system. 316-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.