


default search action
ComComAP 2014: Beijing, China
- IEEE Computers, Communications and IT Applications Conference, ComComAP 2014, Beijing, China, October 20-22, 2014. IEEE 2014, ISBN 978-1-4799-4813-0

- Qingsong Cai, Yuqing Bai, Limin Sun, Jianwei Niu

:
Quantifying individual communication capability in opportunistic mobile social networks. 1-6 - Chao Tong, Zhongyu Xie, Xiaoyun Mo, Jianwei Niu

, Yan Zhang:
Detecting overlapping communities of weighted networks by central figure algorithm. 7-12 - Hailong Zhang, Xiao Guo, Jinyao Yan, Bo Liu, Qianjun Shuai:

SDN-based ECMP algorithm for data center networks. 13-18 - Mir Yasir Umair, Kopparapu Venkata Ramana, Dongkai Yang:

An enhanced K-Nearest Neighbor algorithm for indoor positioning systems in a WLAN. 19-23 - Kai Zhao, Huijuan Cui, Kun Tang:

A novel UEP resource allocation scheme for layered source transmission in COFDM systems. 24-29 - Ming Sun, Hai Wei:

Study on B2M integrated information service platform combined with RFID technology in Medicine circulation field. 30-33 - Shanshan Wan, Zhendong Niu

:
Adaptive Learning Objects Assembly with compound constraints. 34-39 - Xue Xiao, Shufang Wang:

Equalization-based enterprise service selection. 40-45 - Yiding Wang, Di Zhang, Xiaoyu Zhang, Wenqi Wu:

High-temperature electrode faulted diagnosis for copper electrolytic cell. 46-49 - Gangyong Jia, Guangjie Han:

Combine dynamic time-slice scaling with DVFS for coordinating thermal and fairness on CPU. 50-55 - Zhao Kai, Huijuan Cui, Tang Kun:

Optimized Bit Extraction of H.264-SVC MGS stream over error-prone channels. 56-61 - Jianzhong Qi, Feixiang Luo, Qingping Song:

Fast acquisition method of navigation receiver based on folded PMF-FFT. 62-66 - Jinpeng Chen, Yu Liu, Ming Zou:

From tie strength to function: Home location estimation in social network. 67-71 - Meng-meng Miao, Jun Sun, Shixiang Shao:

Cross-layer optimization schemes based on HARQ for Device-to-Device communication. 72-77 - Pingyan Shi, Zhenguo Shi

, Xiaofeng Tao, Jianchao Ji, Xiaohui Liu:
Design of Rake receiver for the multi-path DS-UWB system. 78-83 - Yan Zhang, Fengfan Yang:

The performance analysis of QC-LDPC codes constructed by Dayan sequence for coded cooperative relay. 84-88 - Xiong Li

, Junguo Liao, Jiao Zhang, Jianwei Niu
, Saru Kumari
:
A secure remote user mutual authentication scheme using smart cards. 89-92 - Yu Liu, Jianwei Niu

:
Overlapped-shaking: A local authentication method for mobile applications. 93-97 - Adnan A. Farooqui, Syed Sajjad Haider Zaidi

, Attaullah Y. Memon
, Sameer Qazi
:
Cyber Security Backdrop: A SCADA testbed. 98-103 - Chen Xiao, Tiemeng Li

, Nan Yang, Lifeng Wang, Shilong Ma:
A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints. 104-109 - Xuebin Ma, Zhenchao Ouyang

, Lin Bai, Xin Zhan, Xiangyu Bai:
An overlapping community detection algorithm for opportunistic networks. 110-115 - Yubo Deng, Wei Liu, Lei Zhang, Yongping Xiong, Yunchuan Sun:

Path prediction based on second-order Markov chain for the opportunistic networks. 116-120 - Shaobo Wu, Jianwei Niu

, Long Cheng, Wusheng Chou:
Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networks. 121-126 - Zhu Tang, Baokang Zhao, Wanrong Yu, Zhenqian Feng, Chunqing Wu:

Software defined satellite networks: Benefits and challenges. 127-132 - Chenfei Zhang, Lei Lei, Ting Zhang:

Analyzing the cumulative interfering noise in multi-hop IEEE 802.11 networks. 133-136 - Long Zhang, Liusheng Huang, Hongli Xu:

Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networks. 137-142 - Mohammed I. Alghamdi

, Xunfei Jiang, Xiao Qin
, Jifu Zhang, Minghua Jiang, Meikang Qiu:
TOPS: Two-phase scheduling for distributed real-time systems. 143-148 - Long Cao, Xin Chen, Yuqing Zhang, Donghui Li:

Hot topics detected from micro-bloggings based on word co-occurrence model. 149-154 - Boxue Wang, Xinhuai Tang:

Designing a self-adaptive and context-aware service composition system. 155-160 - Lei Han, Yi Lin, Weiwei Jia:

A new I/O scheduler designed for SSD through exploring performance characteristics. 161-166 - Zhengping Li, Didi Zhang, Jin Ren, Changliu Niu, Jucheng Zhao, Baotong An, Yihua Meng:

Improved dynamic channel allocation algorithm based on ant colony intelligence for P2P service. 167-172 - Jianwen Sun, Xiang Long, Han Wan, Jingwei Yang:

A checkpointing and instant-on mechanism for a embedded system based on non-volatile memories. 173-178 - Yiding Wang, He Gong, Yun Fan, Haijun Cao:

Design of a distributed wireless tree-like data acquisition system based on ZigBee. 179-184 - Ousmane Diallo, Joel J. P. C. Rodrigues, Mbaye Sene, Guangjie Han, Jianwei Niu

:
Improving the data processing in WSNs through combination of a distributed approach and statistical techniques. 185-190 - Li Xu

, Guozhen Tan, Xia Zhang:
A cost sensitive approach for Virtual Network reconfiguration. 191-196 - Yang Yang, Nannan Cheng:

A highway vehicle anti-collision protocol based on broadcasting feedback mechanism. 197-201 - Jin Ren, Zhengping Li, Yujie Guo:

Iterative detection and decoding of MIMO signal using a low-complexity soft-output detector. 202-205 - Yiding Wang, Qi Qi, Kefeng Li:

Liveness detection of dorsal hand vein based on AutoRegressive model. 206-210 - Xue Qiu, Shuguang Wang, Qiong Jia, Chunhe Xia, Qingxin Xia:

An automated method of penetration testing. 211-216 - Xue Wu, Chao Liu, Qingxin Xia:

Safety requirements modeling based on RUCM. 217-222 - Mustafa Muwafak Alobaedy

, Ku Ruhana Ku-Mahamud
:
Scheduling jobs in computational grid using hybrid ACS and GA approach. 223-228 - Xiang Zheng, Fang Xiong, YaoNan Dai:

The technical exploration of implementing hybrid TV with cloud computing in radio and TV industry. 229-233 - Chen Xiao, Wendong Wang, Nan Yang, Lifeng Wang:

A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system. 234-238 - Yunchuan Sun, Junsheng Zhang

, Rongfang Bie, Hongli Yan, Ye Xia, Zhangbing Zhou:
Event-based organization model for sensing data. 239-242 - Pengfei Li, Qi Meng, Weihong Zhang:

Estimation of the number of crop seeds based on image identification. 243-248 - Di Li, Jianwei Niu

, Meikang Qiu, Meiqin Liu:
Sentiment analysis on Weibo data. 249-254 - Yanwen Wang, Xiaoyu Li, Xiaoling Wu, Zhangbing Zhou, Hainan Chen

:
Horizontal hierarchy slicing based data compression for WSN. 255-260 - Bing Zhou, Yanjie Zhou

, Mingliang Xu, Fei Wu:
Computation-aware motion estimation algorithm based on QoE control. 261-265 - Chaoqing Ma, Ou-Bong Gwun, Seung-Han Jeong:

3D simulation of primary thrombus formation based on Level Set Methods. 266-270 - Zehui Cheng, Beibei Yao, Xiaolei Wang, Zhangbing Zhou:

Web service sub-chain recommendation leveraging graph searching. 271-275 - Teng Long, Wenhui Zhang:

Termination analysis with recursive calling graphs. 276-282 - Jinyang Liu, Chuanlei Zhang, Shanwen Zhang, Weidong Fang:

An efficient and accurate optimization method of sliding window size for PAA. 283-286 - Ying Li, Jianwei Niu

, Xiang Long, Meikang Qiu:
Energy efficient scheduling with probability and task migration considerations for soft real-time systems. 287-293 - Weihong Zhang, Yong Chen:

Bayes topic prediction model for focused crawling of vertical search engine. 294-299 - Chao Wang, Jucheng Yang, Yarui Chen, Cao Wu, Yanbin Jiao:

Image latent semantic analysis based face recognition with ensemble extreme learning machine. 300-304 - Qingxin Xia, Yuqing Lan, Liang Zhao, Limin Xiao:

Energy-saving analysis of Cloud workload based on K-means clustering. 305-309 - Donghui Li, Yuqing Zhang, Xin Chen, Long Cao:

Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research. 310-315 - Bassem Khalfi, Mahdi Ben Ghorbel, Bechir Hamdaoui, Mohsen Guizani:

Optimal power allocation for smart-grid powered point-to-point cognitive radio system. 316-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














