


default search action
Mobile Information Systems, Volume 2020
Volume 2020, 2020
- Wei Wang

, Yutao Li
, Ting Zou
, Xin Wang
, Jieyu You
, Yanhong Luo
:
A Novel Image Classification Approach via Dense-MobileNet Models. 7602384:1-7602384:8 - Bo Zhao

, Xiang Li
, Jiayue Li
, Jianwen Zou
, Yifan Liu
:
An Area-Context-Based Credibility Detection for Big Data in IoT. 5068731:1-5068731:12 - JoonSeok Park

, Daeho Kim, Keunhyuk Yeom
:
An Approach for Reconstructing Applications to Develop Container-Based Microservices. 4295937:1-4295937:23 - Felipe A. Cruz-Pérez, Genaro Hernández-Valdez, Andrés Rico-Páez, Sandra Lirio Castellanos-Lopez

, Jose Raul Miranda-Tello
, Grethell G. Pérez-Sánchez
, Ernesto R. Vazquez Ceron:
Performance Sensitivity to the High-Order Statistics of Time Interval Variables in Cellular Networks. 1347601:1-1347601:16 - Guanhua Wang

, Hua Ji
, Dexin Kong
, Na Zhang
:
Modality-Dependent Cross-Modal Retrieval Based on Graph Regularization. 4164692:1-4164692:17 - Cheng Xu

, Hengjie Luo, Hong Bao
, Pengfei Wang:
STEIM: A Spatiotemporal Event Interaction Model in V2X Systems Based on a Time Period and a Raster Map. 1375426:1-1375426:20 - Jingke Dai

, Peng Zhao, Xiao Chen, Fenggan Zhang
:
Analysis and Design of Systematic Rateless Codes in FH/BFSK System with Interference. 9049284:1-9049284:8 - Jinsong Gui

, Xiangwen Dai, Xiaoheng Deng
:
Stabilizing Transmission Capacity in Millimeter Wave Links by Q-Learning-Based Scheme. 7607316:1-7607316:17 - Zhidong Shen

, Siyuan Lu, Huijuan Huang, Meng Yuan, Guoming Tang, Weiying Chen, Taige Zhang, Ting Zhong:
An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection. 3903681:1-3903681:12 - Antonio García-Domínguez

, Carlos Eric Galván-Tejada
, Laura A. Zanella-Calzada
, Hamurabi Gamboa-Rosales
, Jorge I. Galván-Tejada, José M. Celaya-Padilla, Huizilopoztli Luna-García, Rafael Magallanes-Quintanar:
Feature Selection Using Genetic Algorithms for the Generation of a Recognition and Classification of Children Activities Model Using Environmental Sound. 8617430:1-8617430:12 - Mingqi Lv, Chao Huang, Tieming Chen

, Ting Wang:
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification. 4521723:1-4521723:12 - Bingxin Zhang

, Guopeng Zhang
, Weice Sun, Kun Yang:
Task Offloading with Power Control for Mobile Edge Computing Using Reinforcement Learning-Based Markov Decision Process. 7630275:1-7630275:6 - Na Su, Qi Zhu

, Ying Wang:
Resource Allocation Algorithm for NOMA-Enhanced D2D Communications with Energy Harvesting. 4062487:1-4062487:11 - Zhanjun Hao

, Yu Duan
, Xiaochao Dang
, Tong Zhang:
CSI-HC: A WiFi-Based Indoor Complex Human Motion Recognition Method. 3185416:1-3185416:20 - Sabit Rahim

, Sadruddin Bahadur Qutoshi
, Gul Sahar
, Gul Jabeen
, Imran Ali:
Mobile Phone Technologies in Coping with the Challenges and Opportunities of CPEC by the Youth of Rural Mountainous Areas of Gilgit-Baltistan, Pakistan. 5816803:1-5816803:9 - Chunlei Chen

, Peng Zhang
, Huixiang Zhang
, Jiangyan Dai
, Yugen Yi
, Huihui Zhang
, Yonghui Zhang
:
Deep Learning on Computational-Resource-Limited Platforms: A Survey. 8454327:1-8454327:19 - Daegyu Choe

, Eunjeong Choi
, Dong Keun Kim
:
The Real-Time Mobile Application for Classifying of Endangered Parrot Species Using the CNN Models Based on Transfer Learning. 1475164:1-1475164:13 - Ping Ji, Danyang Qin

, Pan Feng, Tingting Lan, Guanyu Sun:
Research on Indoor Scene Classification Mechanism Based on Multiple Descriptors Fusion. 4835198:1-4835198:14 - Sungwook Kim

:
Cooperative Game-Based Virtual Machine Resource Allocation Algorithms in Cloud Data Centers. 9840198:1-9840198:11 - Taoufik Rachad

, Ali Idri:
Intelligent Mobile Applications: A Systematic Mapping Study. 6715363:1-6715363:17 - Ruizhen Gao, Xiaohui Li

, Jingjun Zhang:
Recognition of Point Sets Objects in Realistic Scenes. 4925821:1-4925821:13 - Muhammad Imran Tariq, Nisar Ahmed Memon, Shakeel Ahmed, Shahzadi Tayyaba, Muhammad Tahir Mushtaq, Natash Ali Mian, Muhammad Imran, Muhammad Waseem Ashraf:

A Review of Deep Learning Security and Privacy Defensive Techniques. 6535834:1-6535834:18 - Zhongyuan Wang

, Zijian Wang
, Li Fan
, Zhihao Yu
:
A Hybrid Wi-Fi Fingerprint-Based Localization Scheme Achieved by Combining Fisher Score and Stacked Sparse Autoencoder Algorithms. 5710450:1-5710450:14 - Yannian Zhao, Yonglong Luo

, Qingying Yu, Zhaoyan Hu:
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. 3429256:1-3429256:12 - Myoungbeom Chung

:
Density Estimation System of Space Users Using High Frequencies of Speaker. 7684710:1-7684710:9 - Guangpeng Fan

, Yanqi Dong, Danyu Chen, Feixiang Chen
:
New Method for Forest Resource Data Collection Based on Smartphone Fusion with Multiple Sensors. 5736978:1-5736978:11 - Guangpeng Fan, Feixiang Chen

, Danyu Chen, Yan Li, Yanqi Dong:
A Deep Learning Model for Quick and Accurate Rock Recognition with Smartphones. 7462524:1-7462524:14 - Ziyang Li, Jiong Yu, Chen Bian

, Yonglin Pu, Yuefei Wang, Yitian Zhang, Binglei Guo
:
Flink-ER: An Elastic Resource-Scheduling Strategy for Processing Fluctuating Mobile Stream Data on Flink. 5351824:1-5351824:17 - Mahdi Abbasi

, Navid Mousavi, Milad Rafiee
, Mohammad Reza Khosravi, Varun G. Menon
:
A CRC-Based Classifier Micro-Engine for Efficient Flow Processing in SDN-Based Internet of Things. 7641073:1-7641073:8 - Jianbin Xue, Zesen Wang

, Yonggang Zhang
, Lu Wang:
Task Allocation Optimization Scheme Based on Queuing Theory for Mobile Edge Computing in 5G Heterogeneous Networks. 1501403:1-1501403:12 - Shun Li, Quan Xiao

:
Classification and Improvement Strategy for Design Features of Mobile Tourist Guide Application: A Kano-IPA Approach. 8816130:1-8816130:9 - Limin Shen, Hui Li

, Hongyi Wang, Yihuan Wang:
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications. 3407437:1-3407437:16 - Jimmy Singla

, Balwinder Kaur, Deepak Prashar, Sudan Jha
, Gyanendra Prasad Joshi
, Kyungyun Park
, Usman Tariq
, Changho Seo
:
A Novel Fuzzy Logic-Based Medical Expert System for Diagnosis of Chronic Kidney Disease. 8887627:1-8887627:13 - Min Zhao, Danyang Qin

, Ruolin Guo, Guangchao Xu:
Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles. 2168086:1-2168086:9 - Allan Ng'ang'a

, Paula M. W. Musuva
:
Enhancing Accuracy in a Touch Operation Biometric System: A Case on the Android Pattern Lock Scheme. 4165457:1-4165457:12 - Zhonghui Pei

, Wei Chen
, Hongjiang Zheng, Luyao Du:
Optimization of Maximum Routing Hop Count Parameter Based on Vehicle Density for VANET. 2741648:1-2741648:11 - José García-Alonso

, Javier Berrocal
, Alejandro Pérez-Vereda
, Jaime Galán-Jiménez
, Carlos Canal, Juan Manuel Murillo:
Using Bluetooth Low Energy Advertisements for the Detection of People Temporal Proximity Patterns. 8506323:1-8506323:17 - Sabit Rahim

, Sadruddin Bahadur Qutoshi
, Syeda Abida, Faqeer Muhammad
, Imtiaz Hussain:
Access and Use of Mobile Phone in Daily Life Activities by Rural Women of Gilgit-Baltistan, Pakistan. 8835877:1-8835877:11 - Bingxin Zhang

, Guopeng Zhang
, Shuai Ma
, Kun Yang, Kezhi Wang
:
Efficient Multitask Scheduling for Completion Time Minimization in UAV-Assisted Mobile Edge Computing. 8791030:1-8791030:11 - Chia-Huei Wu, Zi-Chun Yan

, Sang-Bing Tsai
, Weinan Wang, Boshu Cao, Xin Li:
An Empirical Study on Sales Performance Effect and Pricing Strategy for E-Commerce: From the Perspective of Mobile Information. 7561807:1-7561807:8 - Inayat Khan, Shah Khusro

:
Towards the Design of Context-Aware Adaptive User Interfaces to Minimize Drivers' Distractions. 8858886:1-8858886:23 - Shengxiang Wang

, Xiaofan Jia, Qianqian Sang:
A Dual Privacy Preserving Algorithm in Spatial Crowdsourcing. 1960368:1-1960368:6 - Usha Yadav

, Neelam Duhan
, Komal Kumar Bhatia
:
Dealing with Pure New User Cold-Start Problem in Recommendation System Based on Linked Open Data and Social Network Features. 8912065:1-8912065:20 - Muhammad Asghar Khan

, Insaf Ullah, Shibli Nisar, Fazal Noor
, Ijaz Mansoor Qureshi, Fahim Ullah Khanzada, Hizbullah Khattak, Muhammad Adnan Aziz
:
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. 8861947:1-8861947:15 - Junguk Ahn

, Byung Mun Lee
:
Smart Edge Broker for Location-Based Transfer between Services and Distributed Data in IoT Smart Services. 8896252:1-8896252:12 - Dongsheng Liu, Sai Zhao, Quanzhong Li

, Jiayin Qin:
Rate Maximization for Suspicious Multicast Communication Networks with Full-Duplex Proactive Monitoring. 7847623:1-7847623:6 - Bin Wang

, Shumin Li, Fengming Xin:
LWS-Based Time-Domain Synthetic Algorithm with Constant Amplitude in Radar Transmit Waveform. 8864147:1-8864147:16 - Tao Hong

, Gengxin Zhang
:
Power Allocation for Reducing PAPR of Artificial-Noise-Aided Secure Communication System. 6203079:1-6203079:15 - Qinbao Xu, Li Liu, Rizwan Akhtar, Muhammad Asif Zahoor Raja

, Changda Wang
:
Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs. 8818374:1-8818374:9 - Noor Gul, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim

:
Robust Spectrum Sensing via Double-Sided Neighbor Distance Based on Genetic Algorithm in Cognitive Radio Networks. 8876824:1-8876824:10 - Pan Jun Sun

:
A Trust-Game-Based Access Control Model for Cloud Service. 4651205:1-4651205:14 - Zahid Ullah, Asim Zeb

, Insaf Ullah, Khalid Mahmood Awan, Yousaf Saeed, Muhammad Irfan Uddin
, Mahmoud Ahmad Al-Khasawneh
, Marwan Mahmoud
, Mahdi Zareei:
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN). 4138516:1-4138516:13 - Sana Shokat, Rabia Riaz

, Sanam Shahla Rizvi
, Khalil Khan
, Farina Riaz, Se Jin Kwon
:
Analysis and Evaluation of Braille to Text Conversion Methods. 3461651:1-3461651:14 - Huixiang Zhang

, Wenteng Xu, Chunlei Chen, Liang Bai, Yonghui Zhang:
Your Knock Is My Command: Binary Hand Gesture Recognition on Smartphone with Accelerometer. 8864627:1-8864627:16 - Zilin Xu, Wenqiang Li, Yan Li, Jinlong Ma, Qiyu Liu

:
Research on Patent-Knowledge Representation and Automatic Classification Based on Situation Mapping. 5494602:1-5494602:11 - Puneet Garg

, Ashutosh Dixit
, Preeti Sethi
, Plácido Rogério Pinheiro:
Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces. 8868842:1-8868842:18 - Liang Ma

, Xiaoyan Ding, Xin Zhang, Ge Zhang:
Mobile Users' Self-Disclosure Behaviour on WeChat: Application of Social Cognitive Theory. 8903247:1-8903247:13 - Xueyan Liu

, Yukun Luo, Xiaotao Yang:
Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks. 3984048:1-3984048:12 - Xingsi Xue

, Xiaoquan Lin, Chaofan Yang, Xiaojing Wu:
An Improved Indoor Positioning Technique Based on Receiving Signal's Strength. 8822288:1-8822288:10 - Maleeha Javed, Hassan Dawood

, Muhammad Murtaza Khan, Ameen Banjar
, Riad Alharbey, Hussain Dawood
:
Personal Communication Technologies for Smart Spaces Density-Based Clustering for Content and Color Adaptive Tone Mapping. 8846033:1-8846033:10 - Dominik Neznik, L'ubomír Dobos

, Ján Papaj:
Smart Radio Resource Management for Content Delivery Services in 5G and Beyond Networks. 8898798:1-8898798:14 - Emilio Sansano-Sansano

, Óscar Belmonte Fernández
, Raúl Montoliu, Arturo Gascó-Compte, Antonio Caballer Miedes
:
Multimodal Sensor Data Integration for Indoor Positioning in Ambient-Assisted Living Environments. 5204158:1-5204158:16 - Yu Zhang, Wei He

, Yin Li
:
Efficient Boolean Keywords Search over Encrypted Cloud Data in Public Key Setting. 2904861:1-2904861:15 - Ashir Javeed

, Sanam Shahla Rizvi
, Shijie Zhou, Rabia Riaz, Shafqat Ullah Khan, Se Jin Kwon
:
Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification. 8843115:1-8843115:11 - Muhammad Imran Tariq

, Natash Ali Mian, Abid Sohail, Tahir Alyas
, Rehan Ahmad:
Evaluation of the Challenges in the Internet of Medical Things with Multicriteria Decision Making (AHP and TOPSIS) to Overcome Its Obstruction under Fuzzy Environment. 8815651:1-8815651:19 - Guangsong Li, Yang Wang

, Bin Zhang, Siqi Lu
:
Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks. 2964562:1-2964562:16 - Zhaorui Li, Xiaobei Wu, Peizhang Cui

, Guangkai Liu:
The Mean First Passage Time of the Stochastic Resonance Driven by Dual-Sequence-Frequency-Hopping Signal and Noise. 8845160:1-8845160:8 - Qaisar Shaheen

, Muhammad Shiraz, Muhammad Usman Hashmi, Danish Mahmood, Zhiyu Zhu, Rizwan Akhtar
:
A Lightweight Location-Aware Fog Framework (LAFF) for QoS in Internet of Things Paradigm. 8871976:1-8871976:15 - Arvind Ramtohul

, Kavi Kumar Khedo
:
Mobile Positioning Techniques and Systems: A Comprehensive Review. 3708521:1-3708521:18 - Hwan-Seok Yang

:
A Study on Improving Secure Routing Performance Using Trust Model in MANET. 8819587:1-8819587:17 - Rui Zhang, Hui Xia

, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng
:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. 8844116:1-8844116:9 - Tian Bai

, Zhijie Li, Bo Fan
:
Multiprocessor Scheduling of Sensor Transactions for Real-Time Data Quality Maintenance. 8834383:1-8834383:13 - Lingqiu Zeng, Sheng Cheng, Qingwen Han

, Lei Ye:
A Vehicular Service-Oriented Dynamical Routing Searching Algorithm in Software-Defined BusNet. 8856130:1-8856130:10 - Gang Liu, Shaoqing Fei, Zi-Chun Yan, Chia-Huei Wu

, Sang-Bing Tsai
, Jinglan Zhang:
An Empirical Study on Response to Online Customer Reviews and E-Commerce Sales: From the Mobile Information System Perspective. 8864764:1-8864764:12 - David Chunhu Li

, Bo-Hun Chen, Chia-Wei Tseng, Li-Der Chou
:
A Novel Genetic Service Function Deployment Management Platform for Edge Computing. 8830294:1-8830294:22 - Sung Tae Kim, Taeyong Park, Geochang Jeon, Jeong Hyun Yi

:
Self-Controllable Mobile App Protection Scheme Based on Binary Code Splitting. 8813243:1-8813243:11 - Weiping Ouyang

, Chunguang Ma, Guoyin Zhang, Keming Diao:
Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection. 8862920:1-8862920:10 - Xiangjun Zhang

, Weiguo Wu
, Shiyuan Yang, Xiong Wang:
Falcon: A Blockchain-Based Edge Service Migration Framework in MEC. 8820507:1-8820507:17 - Sana Messous

, Hend Liouane:
Online Sequential DV-Hop Localization Algorithm for Wireless Sensor Networks. 8195309:1-8195309:14 - Hongzhi Li

, Dezhi Han:
A Novel Time-Aware Hybrid Recommendation Scheme Combining User Feedback and Collaborative Filtering. 8896694:1-8896694:16 - Vladimir Sobeslav

, Josef Horalek
:
A Smart Parking System Based on Mini PC Platform and Mobile Application for Parking Space Detection. 8875301:1-8875301:15 - Uzair Javaid, Furqan Jameel

, Umair Javaid, Muhammad Toaha Raza Khan, Riku Jäntti:
Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach. 8831976:1-8831976:13 - Vinay Arora

, Rohan Singh Leekha
, Kyungroul Lee
, Aman Kataria
:
Facilitating User Authorization from Imbalanced Data Logs of Credit Cards Using Artificial Intelligence. 8885269:1-8885269:13 - Mohammad Moradi

, Kheirollah Rahsepar Fard:
A Method to Diagnose, Improve, and Evaluate Children's Learning Using Wearable Devices Such as Mobile Devices in the IoT Environment. 8850244:1-8850244:25 - Hamid Garmani

, Driss Ait Omar
, Mohamed El Amrani
, Mohamed Baslam
, Mostafa Jourhmane
:
The Effect of Caching on CP and ISP Policies in Information-Centric Networks. 8895271:1-8895271:18 - Daohua Pan

, Hongwei Liu
, Dongming Qu, Zhan Zhang:
Human Falling Detection Algorithm Based on Multisensor Data Fusion with SVM. 8826088:1-8826088:9 - Mingze Wei

, Lei Yuan
:
Performance Optimization Mechanism of Adolescent Physical Training Based on Reinforcement Learning and Markov Model. 8868225:1-8868225:10 - Wasif Akbar

, Wei-Ping Wu, Sehrish Saleem, Muhammad Farhan
, Muhammad Asim Saleem
, Ashir Javeed
, Liaqat Ali
:
Development of Hepatitis Disease Detection System by Exploiting Sparsity in Linear Support Vector Machine to Improve Strength of AdaBoost Ensemble Model. 8870240:1-8870240:9 - Yen-Wu Ti

, Shang-Kuan Chen
, Wen-Chieh Wu
:
A New Visual Cryptography-Based QR Code System for Medication Administration. 8885242:1-8885242:10 - Pin Lv

, Siyu Pan
, Jia Xu
:
WiFi-Based Virtual Access Network Scheduling for Downlink Traffic Dominated Smart Spaces. 8848558:1-8848558:9 - Xiaojuan Xie

, Shengliang Peng
, Xi Yang
:
Deep Learning-Based Signal-To-Noise Ratio Estimation Using Constellation Diagrams. 8840340:1-8840340:9 - Xinman Zhang

, Kunlei Jing
, Guokun Song:
Research and Development of Palmprint Authentication System Based on Android Smartphones. 8846192:1-8846192:16 - Qiufen Ni

, Chuanhe Huang
, Panos M. Pardalos, Jia Ye, Bin Fu:
Different Approximation Algorithms for Channel Scheduling in Wireless Networks. 8836517:1-8836517:13 - Slavomir Matuska

, Martin Paralic
, Róbert Hudec
:
A Smart System for Sitting Posture Detection Based on Force Sensors and Mobile Application. 6625797:1-6625797:13 - Hongyi Li, Xinrui Che

:
DRL-Based Edge Computing Model to Offload the FIFA World Cup Traffic. 8825643:1-8825643:11 - Sungwook Kim

:
Heterogeneous Network Spectrum Allocation Scheme for Network-Assisted D2D Communications. 8825119:1-8825119:11 - Jiuren Qin

, Zhaoxue Wang
, Kai Gao
, Lujie Zhong
:
Failure-Aware and Delay-Predicted Multipath Virtual Queue Scheduling for Multimedia Transmission in Edge IoT. 6673134:1-6673134:12 - Jiho Shin

, Ilsun You
, Jung-Taek Seo
:
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. 8878088:1-8878088:11 - Yuan Yu

, Tieyan Zhang, Yan Zhao:
Optimization Strategy of Multiarea Interconnected Integrated Energy System Based on Consistency Theory. 8884525:1-8884525:10 - Xinyu Gu

, Yiyi Xu
, Jiahan Zhang
:
Joint Resource Allocation and Power Control Based on Vehicle's Motion Characteristics in NOMA-Based V2V Systems. 8811067:1-8811067:13 - Bingcheng Wang

, Man Wu, Pei-Luen Patrick Rau
, Qin Gao:
Influence of Native Video Advertisement Duration and Key Elements on Advertising Effectiveness in Mobile Feeds. 8836195:1-8836195:12 - Thien-Phuc Doan

, Jungsoo Park
, Souhwan Jung
:
HAL-Based Resource Manipulation Monitoring on AOSP. 8863385:1-8863385:9 - Pawel Weichbroth

, Lukasz Lysik:
Mobile Security: Threats and Best Practices. 8828078:1-8828078:15

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














