


Остановите войну!
for scientists:


default search action
IEEE Systems Journal, Volume 11
Volume 11, Number 1, March 2017
- Vincenzo Piuri:
Editorial. 3 - Kan Zheng
, Victor C. M. Leung, Lie-Liang Yang, Periklis Chatzimisios
:
Guest Editorial Special Issue on 5G Wireless Systems With Massive MIMO. 4-6 - Yi Xu, Shiwen Mao:
User Association in Massive MIMO HetNets. 7-19 - Lifeng Wang, Hien Quoc Ngo, Maged Elkashlan, Trung Quang Duong
, Kai-Kit Wong:
Massive MIMO in Spectrum Sharing Networks: Achievable Rate and Power Efficiency. 20-31 - Juei-Chin Shen, Jun Zhang
, Kwang-Cheng Chen, Khaled Ben Letaief:
High-Dimensional CSI Acquisition in Massive MIMO: Sparsity-Inspired Approaches. 32-40 - Liangtian Wan, Guangjie Han, Jinfang Jiang, Joel J. P. C. Rodrigues, Naixing Feng, Tong Zhu:
DOA Estimation for Coherently Distributed Sources Considering Circular and Noncircular Signals in Massive MIMO Systems. 41-49 - Hengzhi Wang, Wei Wang, Vincent K. N. Lau, Zhaoyang Zhang:
Hybrid Limited Feedback in 5G Cellular Systems With Massive MIMO. 50-61 - Guangyi Liu, Xueying Hou, Fei Wang, Jing Jin, Hui Tong, Yuhong Huang:
Achieving 3D-MIMO With Massive Antennas From Theory to Practice With Evaluation and Field Trial Results. 62-71 - Yu Han, Haochuan Zhang, Shi Jin, Xiao Li, Rong Yu, Yan Zhang:
Investigation of Transmission Schemes for Millimeter-Wave Massive MU-MIMO Systems. 72-83 - Jiafu Wan
, Daqiang Zhang, Athanasios V. Vasilakos
, Jaime Lloret:
Guest Editorial Special Issue on Cloud-Integrated Cyber-Physical Systems. 84-87 - Yin Zhang
, Meikang Qiu, Chun-Wei Tsai, Mohammad Mehedi Hassan, Atif Alamri:
Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data. 88-95 - Yibin Li, Min Chen
, Wenyun Dai, Meikang Qiu:
Energy Optimization With Dynamic Task Scheduling Mobile Cloud Computing. 96-105 - Chi Harold Liu, Zhen Zhang, Min Chen
:
Personalized Multimedia Recommendations for Cloud-Integrated Cyber-Physical Systems. 106-117 - M. Shamim Hossain:
Cloud-Supported Cyber-Physical Localization Framework for Patients Monitoring. 118-127 - Bingyi Liu, Dongyao Jia
, Jianping Wang, Kejie Lu, Libing Wu
:
Cloud-Assisted Safety Message Dissemination in VANET-Cellular Heterogeneous Wireless Network. 128-139 - Neeraj Kumar
, Mukesh Singh, Sherali Zeadally, Joel J. P. C. Rodrigues
, Seungmin Rho:
Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid. 140-151 - Dingding Li
, Mianxiong Dong, Yong Tang, Laurence T. Yang, Kaoru Ota
, Gansen Zhao:
Triple-L: Improving CPS Disk I/O Performance in a Virtualized NAS Environment. 152-162 - Saif Ur Rehman Malik
, Kashif Bilal, Samee U. Khan
, Bharadwaj Veeravalli, Keqin Li, Albert Y. Zomaya
:
Modeling and Analysis of the Thermal Properties Exhibited by Cyberphysical Data Centers. 163-172 - Seong-Hwan Kim, Dong-Ki Kang, Woojoong Kim, Min Chen
, Chan-Hyun Youn:
A Science Gateway Cloud With Cost-Adaptive VM Management for Computational Science and Applications. 173-185 - Ming-Shi Wang, Shih-Yeh Chen, Yu-Jhih Wang:
A Power-Scalable Three-Dimensional Streaming Playback Mechanism on Heterogeneous System Architectures. 186-193 - Jun Liu, Zheng Yan
, Athanasios V. Vasilakos
, Laurence T. Yang:
Guest Editorial Data Mining in Cyber, Physical, and Social Computing. 194-196 - Saman Iftikhar
, M. Kamran
, Ehsan Ullah Munir, Samee U. Khan
:
A Reversible Watermarking Technique for Social Network Data Sets for Enabling Data Trust in Cyber, Physical, and Social Computing. 197-206 - Zheng Yan
, Mingjun Wang:
Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels. 207-218 - Tao Peng, Qin Liu, Guojun Wang:
Enhanced Location Privacy Preserving Scheme in Location-Based Services. 219-230 - Salvatore Distefano
, Giovanni Merlino
, Antonio Puliafito:
Device-Centric Sensing: An Alternative to Data-Centric Approaches. 231-241 - Iván Cabria
, Iker Gondra:
Potential-K-Means for Load Balancing and Cost Minimization in Mobile Recycling Network. 242-249 - Fei Hao
, Geyong Min
, Zheng Pei, Doo-Soon Park, Laurence T. Yang:
K-Clique Community Detection in Social Networks Based on Formal Concept Analysis. 250-259 - Shouyi Yin, Peng Ouyang, Xu Dai, Leibo Liu
, Shaojun Wei:
An AdaBoost-Based Face Detection System Using Parallel Configurable Architecture With Optimized Computation. 260-271 - Jiaqi Zhao, Changlong Xue, Jie Tao, Rajiv Ranjan
, Joanna Kolodziej, Lizhe Wang, Dan Chen:
Trusted Performance Analysis on Systems With a Shared Memory. 272-282 - Taotao Wu, Wanchun Dou, Chunhua Hu, Jinjun Chen:
Service Mining for Trusted Service Composition in Cross-Cloud Environment. 283-294 - Haifeng Liu, Feng Xia
, Zhen Chen, Nana Yaw Asabere
, Jianhua Ma, Runhe Huang:
TruCom: Exploiting Domain-Specific Trust Networks for Multicategory Item Recommendation. 295-304 - Caifeng Zou, Daqiang Zhang
, Jiafu Wan
, Mohammad Mehedi Hassan, Jaime Lloret:
Using Concept Lattice for Personalized Recommendation System Design. 305-314 - Sha Zhao, Gang Pan, Yifan Zhao, Jianrong Tao, Jinlai Chen, Shijian Li, Zhaohui Wu:
Mining User Attributes Using Large-Scale APP Lists of Smartphones. 315-323 - Feng Zhao, Fengwei Yan, Hai Jin, Laurence T. Yang, Chen Yu:
Personalized Mobile Searching Approach Based on Combining Content-Based Filtering and Collaborative Filtering. 324-332 - Cheng Xie, Guoqiang Li, Hongming Cai, Lihong Jiang, Neal N. Xiong:
Dynamic Weight-Based Individual Similarity Calculation for Information Searching in Social Computing. 333-344 - Yuhui Deng
, Zhen Zhang, Junlian Liao, Laurence T. Yang:
SIM: A Search Engine by Correlating Scattered Data Sets for Cyber, Physical, and Social Systems. 345-355 - Bo Wu, Xiaokang Zhou, Qun Jin, Fuhua Lin, Henry Leung:
Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support. 356-365
Volume 11, Number 2, June 2017
- Vincenzo Piuri:
Editorial. 370 - Ilsun You, Gabriele Lenzini, Alfredo De Santis
:
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. 371-372 - Abdulaziz Almehmadi, Khalil El-Khatib
:
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC). 373-384 - Chia-Mu Yu, Chi-Yuan Chen, Han-Chieh Chao:
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data. 385-394 - Mazhar Ali, Revathi Dhamotharan, Eraj Khan, Samee U. Khan
, Athanasios V. Vasilakos
, Keqin Li, Albert Y. Zomaya
:
SeDaSC: Secure Data Sharing in Clouds. 395-404 - Lidia Ogiela, Marek R. Ogiela:
Insider Threats and Cryptographic Techniques in Secure Information Management. 405-414 - Aditya K. Sood, Sherali Zeadally, Rohit Bansal:
Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats. 415-426 - Fang-Yie Leu, Kun-Lin Tsai
, Yi-Ting Hsiao, Chao-Tung Yang
:
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques. 427-438 - Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang, Duncan S. Wong:
Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. 439-448 - Hsing-Chung Chen
:
TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks. 449-459 - Massimo Ficco, Francesco Palmieri
:
Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks. 460-470 - Brock Bose, Bhargav Avasarala, Srikanta Tirthapura, Yung-Yu Chung, Donald Steiner:
Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams. 471-482 - Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, Robert Michael Lefler, Donald Steiner:
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts. 483-493 - Jaewoo Choi, Jihyun Bang, LeeHyung Kim, Mirim Ahn, Taekyoung Kwon:
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks. 494-502 - Philip A. Legg, Oliver Buckley
, Michael Goldsmith, Sadie Creese:
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. 503-512 - Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam:
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location. 513-521 - Anandarup Sarkar, Sven Köhler, Bertram Ludäscher, Matt Bishop
:
Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. 522-533 - Florian Kammüller, Christian W. Probst
:
Modeling and Verification of Insider Threats Using Logical Analysis. 534-545 - Jinsong Wu
, Richard T. Watson, Raffaele Bolla
, Athanassios Manikas, Mounir Hamdi
, Jaafar M. H. Elmirghani
:
Guest Editorial Special Issue on Green Communications, Computing, and Systems. 546-550 - Mehmet Köseoglu
, Ezhan Karasan, Lin Chen:
Cross-Layer Energy Minimization for Underwater ALOHA Networks. 551-561 - Mamoun Guenach, Mahdi Ben Ghorbel, Koen Hooghe:
Improving the Energy Efficiency of Broadband Copper Access Networks: Review and Performance Analysis. 562-577 - Shu Fu, Hong Wen, Jinsong Wu
, Bin Wu:
Energy-Efficient Precoded Coordinated Multi-Point Transmission With Pricing Power Game Mechanism. 578-587 - Raffaele Bolla
, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto
:
Network Connectivity Proxy: Architecture, Implementation, and Performance Analysis. 588-599 - Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su
:
PoweRock: Power Modeling and Flexible Dynamic Power Management for Many-Core Architectures. 600-612 - Debdeep Paul, Wen-De Zhong, Sanjay K. Bose
:
Demand Response in Data Centers Through Energy-Efficient Scheduling and Simple Incentivization. 613-624 - Chao Fang, F. Richard Yu
, Tao Huang, Jiang Liu, Yunjie Liu:
Distributed Energy Consumption Management in Green Content-Centric Networks via Dual Decomposition. 625-636 - Esteban Rodríguez, Gustavo Prado Alkmim, Nelson L. S. da Fonseca
, Daniel Macêdo Batista
:
Energy-Aware Mapping and Live Migration of Virtual Networks. 637-648 - Tao Lin, Tansu Alpcan
, Kerry Hinton:
A Game-Theoretic Analysis of Energy Efficiency and Performance for Cloud Computing in Communication Networks. 649-660 - Obinna Okonor, Ning Wang, Stylianos Georgoulas, Zhili Sun:
Green Link Weights for Disruption-Free Energy-Aware Traffic Engineering. 661-672 - Thilo Schondienst, Vinod M. Vokkarane
:
Reducing Greenhouse Gas Emissions With Power Source-Aware Multidomain Multilayer Networks. 673-683 - Derya Cavdar, Lydia Y. Chen, Fatih Alagöz:
Priority Scheduling for Heterogeneous Workloads: Tradeoff Between Evictions and Response Time. 684-695 - Murat Kocaoglu, Özgür B. Akan:
Energy Minimization With Network Coding via Latin Hypercubes. 696-705 - Yao-Liang Chung:
Energy-Saving Transmission for Green Macrocell-Small Cell Systems: A System-Level Perspective. 706-716 - Ryota Yoshizawa
, Hideki Ochiai:
Energy Efficiency Improvement of Coded OFDM Systems Based on PAPR Reduction. 717-728 - Samantha Gamboa
, Alexander Pelov, Patrick Maillé
, Xavier Lagrange, Nicolas Montavont:
Reducing the Energy Footprint of Cellular Networks with Delay-Tolerant Users. 729-739 - Xiguang Wu, Jacques Palicot, Pierre Leray:
Metrics on Energy Efficiency for Cognitive Green Equipment Based on FPGA Platform. 740-751 - Federico Pederzolli
, Domenico Siracusa
, Elio Salvadori, Renato Lo Cigno
:
Energy Saving Through Traffic Profiling in Self-Optimizing Optical Networks. 752-761 - Arno Scharl
, David D. Herring, Walter Rafelsberger, Alexander Hubmann-Haidvogel
, Ruslan Kamolov, Daniel Fischl, Michael Föls, Albert Weichselbraun
:
Semantic Systems and Visual Tools to Support Environmental Communication. 762-771 - Amir Varasteh, Maziar Goudarzi
:
Server Consolidation Techniques in Virtualized Data Centers: A Survey. 772-783 - Zakia Asad, Mohammad Asad Rehman Chaudhry:
A Two-Way Street: Green Big Data Processing for a Greener Smart Grid. 784-795 - Navroop Kaur
, Sandeep K. Sood
:
An Energy-Efficient Architecture for the Internet of Things (IoT). 796-805 - Hai Jiang, Fangwing Liu, Ruppa K. Thulasiram, Erol Gelenbe:
Guest Editorial: Special Issue on Green Pervasive and Ubiquitous Systems. 806-812 - Meikang Qiu, Zhi Chen, Zhong Ming, Xiao Qin, Jianwei Niu:
Energy-Aware Data Allocation With Hybrid Memory for Mobile Cloud Systems. 813-822 - Chen Yu, Dezhong Yao
, Laurence T. Yang, Hai Jin:
Energy Conservation in Progressive Decentralized Single-Hop Wireless Sensor Networks for Pervasive Computing Environment. 823-834 - Chi Xu, Ziyang Zhao, Haiyang Wang, Ryan Shea, Jiangchuan Liu:
Energy Efficiency of Cloud Virtual Machines: From Traffic Pattern and CPU Affinity Perspectives. 835-845 - Bang Wang, Qiao Kong, Wenyu Liu
, Laurence T. Yang:
On Efficient Utilization of Green Energy in Heterogeneous Cellular Networks. 846-857 - Xiumin Wang, Jin Wang, Xin Wang, Xiaoming Chen:
Energy and Delay Tradeoff for Application Offloading in Mobile Cloud Computing. 858-867 - Jun Long, Mianxiong Dong, Kaoru Ota
, Anfeng Liu:
A Green TDMA Scheduling Algorithm for Prolonging Lifetime in Wireless Sensor Networks. 868-877 - Jorg Lenhardt, Kai Chen, Wolfram Schiffmann:
Energy-Efficient Web Server Load Balancing. 878-888 - Xieming Li
, Osamu Tatebe:
Data-Aware Task Dispatching for Batch Queuing System. 889-897 - Dancheng Li, Wei Wang, Quanzuo Li, Jingde Cheng:
A Comprehensive Evaluation of Scheduling Methods of Virtual Machine Migration for Energy Conservation. 898-909 - Yang Liu, Shiyan Hu, Han Huang, Rajiv Ranjan
, Albert Y. Zomaya
, Lizhe Wang
:
Game-Theoretic Market-Driven Smart Home Scheduling Considering Energy Balancing. 910-921 - Feng Ye, Yi Qian, Rose Qingyang Hu:
Incentive Load Scheduling Schemes for PHEV Battery Exchange Stations in Smart Grid. 922-930 - Fakhruddin Muhammad Mahbub Ul Islam, Man Lin:
Hybrid DVFS Scheduling for Real-Time Systems Based on Reinforcement Learning. 931-940 - Wenxiang Li, Chunsheng Zhu, Laurence T. Yang, Lei Shu
, Edith C. H. Ngai, Yajie Ma:
Subtask Scheduling for Distributed Robots in Cloud Manufacturing. 941-950 - Mohammad Mehedi Hassan, Mohammad Abdullah-Al-Wadud
, Ahmad Almogren
, Biao Song, Atif Alamri:
Energy-Aware Resource and Revenue Management in Federated Cloud: A Game-Theoretic Approach. 951-961 - Hiroyuki Okamura
, Tadashi Dohi:
Dynamic Power Management With Optimal Time-Out Policies. 962-972 - Yuxia Cheng, Wenzhi Chen, Zonghui Wang, Xinjie Yu:
Performance-Monitoring-Based Traffic-Aware Virtual Machine Deployment on NUMA Systems. 973-982 - Faisal Karim Shaikh, Sherali Zeadally, Ernesto Exposito
:
Enabling Technologies for Green Internet of Things. 983-994 - Yujian Fang, Yuezhi Zhou, Xiaohong Jiang, Yaoxue Zhang:
Practical Performance of MANETs Under Limited Buffer and Packet Lifetime. 995-1005 - Yuanfang Chi, Xiuhua Li, Xiaofei Wang, Victor C. M. Leung, Abdallah Shami
:
A Fairness-Aware Pricing Methodology for Revenue Enhancement in Service Cloud Infrastructure. 1006-1017 - Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. 1018-1026 - Jiaoyan Chen, Bang Wang, Wenyu Liu
, Laurence T. Yang, Xianjun Deng:
Rotating Directional Sensors to Mend Barrier Gaps in a Line-Based Deployed Directional Sensor Network. 1027-1038 - Amrita Ghosal, Subir Halder:
Lifetime Optimizing Clustering Structure Using Archimedes' Spiral-Based Deployment in WSNs. 1039-1048 - Feng Zhao, Guodong Nian, Hai Jin, Laurence T. Yang, Yajun Zhu:
A Hybrid eBusiness Software Metrics Framework for Decision Making in Cloud Computing Environment. 1049-1059 - Chen Yu, Yang Liu, Dezhong Yao
, Laurence T. Yang, Hai Jin, Hanhua Chen, Qiang Ding:
Modeling User Activity Patterns for Next-Place Prediction. 1060-1071 - Haijing Liu, Hui Gao, Shaoshi Yang
, Tiejun Lv:
Low-Complexity Downlink User Selection for Massive MIMO Systems. 1072-1083 - Sudip Misra
, Subarna Chatterjee, Mohammad S. Obaidat
:
On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network. 1084-1093 - Nicolas Boillot, Dominique Dhoutaut, Julien Bourgeois:
New Applications for MEMS Modular Robots Using Wireless Communications. 1094-1106 - Yongnu Jin, Kyung Sup Kwak:
A Transmitted Reference Pulse Cluster Averaging UWB Receiver. 1107-1115 - Yu-Hsun Chen, Eric Hsiao-Kuang Wu, Gen-Huey Chen:
Bandwidth-Satisfied Multicast by Multiple Trees and Network Coding in Lossy MANETs. 1116-1127 - Xiaoming Chen, Yu Zhang:
Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective. 1128-1136 - Chin-Yu Lai, Pi-Chung Wang
:
Fast and Complete Conflict Detection for Packet Classifiers. 1137-1148 - Charu Sharma, Barjeev Tyagi:
Fuzzy Type-2 Controller Design for Small-Signal Stability Considering Time Latencies and Uncertainties in PMU Measurements. 1149-1160 - Susmita Kar
, S. R. Samantaray, M. Dadash Zadeh:
Data-Mining Model Based Intelligent Differential Microgrid Protection Scheme. 1161-1169 - Ali Hajebrahimi, Amir Abdollahi, Masoud RashidiNejad
:
Probabilistic Multiobjective Transmission Expansion Planning Incorporating Demand Response Resources and Large-Scale Distant Wind Farms. 1170-1181 - Deepak Kumar, S. R. Samantaray, Innocent Kamwa
:
MOSOA-Based Multiobjective Design of Power Distribution Systems. 1182-1195 - Mojgan Mollahassani-pour
, Masoud RashidiNejad
, Amir Abdollahi, Mohamad Ali Forghani:
Demand Response Resources' Allocation in Security-Constrained Preventive Maintenance Scheduling via MODM Method. 1196-1207 - Tor Arne Johansen:
Toward Dependable Embedded Model Predictive Control. 1208-1219
Volume 11, Number 3, September 2017
- Vincenzo Piuri:
Editorial. 1223-1224 - Ching-Hsien Hsu, Shangguang Wang
, Yu Yuan:
Guest Editorial Special Issue on Hybrid Intelligence for Internet of Vehicles. 1225-1227 - Chung-Ming Huang, Han-Lin Wang, Huan Zhou, Shouzhi Xu, Dong Ren:
EVAC-AV: The Live Road Surveillance Control Scheme Using an Effective-Vision-Area-Based Clustering Algorithm With the Adaptive Video-Streaming Technique. 1228-1238 - Lina Zhu
, Changle Li, Bing Xia, Ying He, Qin Lin:
A Hybrid Routing Protocol for 3-D Vehicular Ad Hoc Networks. 1239-1248 - Anand Paul
, Alfred Daniel
, Awais Ahmad, Seungmin Rho:
Cooperative Cognitive Intelligence for Internet of Vehicles. 1249-1258 - Lin Zhang, Shucong Jia, Zishan Liu, Yumei Wang, Yu Liu:
Bus-Ads: Bus Trajectory-Based Advertisement Distribution in VANETs Using Coalition Formation Games. 1259-1268