callback( { "result":{ "query":":facetid:toc:\"db/journals/wpc/wpc93.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"75.40" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"67", "@dc":"67", "@oc":"67", "@id":"43490365", "text":":facetid:toc:db/journals/wpc/wpc93.bht" } }, "hits":{ "@total":"67", "@computed":"67", "@sent":"67", "@first":"0", "hit":[{ "@score":"1", "@id":"2865397", "info":{"authors":{"author":[{"@pid":"137/6752","text":"Ahmed Badawy"},{"@pid":"39/2509","text":"Richard S. Wolff"}]},"title":"A Hardware Based Ricean Fading Radio Channel Simulator.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"615-627","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/BadawyW17","doi":"10.1007/S11277-014-2217-X","ee":"https://doi.org/10.1007/s11277-014-2217-x","url":"https://dblp.org/rec/journals/wpc/BadawyW17"}, "url":"URL#2865397" }, { "@score":"1", "@id":"2865398", "info":{"authors":{"author":[{"@pid":"15/3241","text":"JumHan Bae"},{"@pid":"127/4971","text":"Nam Tuan Le"},{"@pid":"38/6549","text":"Jong Tae Kim"}]},"title":"Smartphone Image Receiver Architecture for Optical Camera Communication.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"1043-1066","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/BaeLK17","doi":"10.1007/S11277-017-3971-3","ee":"https://doi.org/10.1007/s11277-017-3971-3","url":"https://dblp.org/rec/journals/wpc/BaeLK17"}, "url":"URL#2865398" }, { "@score":"1", "@id":"2865433", "info":{"authors":{"author":[{"@pid":"183/0390","text":"Vinod Kumar Bhalla"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"}]},"title":"An Efficient Multiclass Classifier Using On-Page Positive Personality Features for Web Page Classification for the Next Generation Wireless Communication Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"503-522","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/BhallaK17","doi":"10.1007/S11277-016-3173-4","ee":"https://doi.org/10.1007/s11277-016-3173-4","url":"https://dblp.org/rec/journals/wpc/BhallaK17"}, "url":"URL#2865433" }, { "@score":"1", "@id":"2865436", "info":{"authors":{"author":[{"@pid":"195/6658","text":"C. Bharathi"},{"@pid":"245/9766","text":"Duraisamy Rekha"},{"@pid":"199/7401","text":"V. Vijayakumar 0002"}]},"title":"Genetic Algorithm Based Demand Side Management for Smart Grid.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"481-502","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/BharathiRV17","doi":"10.1007/S11277-017-3959-Z","ee":"https://doi.org/10.1007/s11277-017-3959-z","url":"https://dblp.org/rec/journals/wpc/BharathiRV17"}, "url":"URL#2865436" }, { "@score":"1", "@id":"2865472", "info":{"authors":{"author":[{"@pid":"78/5968","text":"Cheol-Joo Chae"},{"@pid":"75/2603","text":"Han-Jin Cho"}]},"title":"User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"67-79","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ChaeC17","doi":"10.1007/S11277-016-3595-Z","ee":"https://doi.org/10.1007/s11277-016-3595-z","url":"https://dblp.org/rec/journals/wpc/ChaeC17"}, "url":"URL#2865472" }, { "@score":"1", "@id":"2865485", "info":{"authors":{"author":[{"@pid":"32/11473","text":"Shehzad Ashraf Chaudhry"},{"@pid":"78/9595","text":"Mohammad Sabzinejad Farash"},{"@pid":"39/7209","text":"Husnain Naqvi"},{"@pid":"170/4220","text":"SK Hafizul Islam"},{"@pid":"15/5924","text":"Taeshik Shon"}]},"title":"A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"311-335","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ChaudhryFNIS17","doi":"10.1007/S11277-015-3139-Y","ee":"https://doi.org/10.1007/s11277-015-3139-y","url":"https://dblp.org/rec/journals/wpc/ChaudhryFNIS17"}, "url":"URL#2865485" }, { "@score":"1", "@id":"2865512", "info":{"authors":{"author":[{"@pid":"197/3177","text":"Hae-il Choi"},{"@pid":"197/3330","text":"Hyung-jik Kim"},{"@pid":"07/2161","text":"Sunwoong Choi"}]},"title":"Capture-Aware Couple-Resolution Blocking Protocol in RFID Systems.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"969-986","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ChoiKC17","doi":"10.1007/S11277-016-3940-2","ee":"https://doi.org/10.1007/s11277-016-3940-2","url":"https://dblp.org/rec/journals/wpc/ChoiKC17"}, "url":"URL#2865512" }, { "@score":"1", "@id":"2865514", "info":{"authors":{"author":[{"@pid":"162/5756","text":"Jeongwon Choi"},{"@pid":"74/11299","text":"Youngjun Lee"},{"@pid":"81/10951","text":"Eunkyoung Lee"}]},"title":"Puzzle Based Algorithm Learning for Cultivating Computational Thinking.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"131-145","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ChoiLL17","doi":"10.1007/S11277-016-3679-9","ee":"https://doi.org/10.1007/s11277-016-3679-9","url":"https://dblp.org/rec/journals/wpc/ChoiLL17"}, "url":"URL#2865514" }, { "@score":"1", "@id":"2865515", "info":{"authors":{"author":[{"@pid":"12/2352","text":"Hyo Hyun Choi"},{"@pid":"136/6152","text":"Su Hyun Nam"},{"@pid":"15/5924","text":"Taeshik Shon"}]},"title":"Two Tier Search Scheme Using Micro UAV Swarm.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"349-363","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ChoiNS17","doi":"10.1007/S11277-016-3184-1","ee":"https://doi.org/10.1007/s11277-016-3184-1","url":"https://dblp.org/rec/journals/wpc/ChoiNS17"}, "url":"URL#2865515" }, { "@score":"1", "@id":"2865523", "info":{"authors":{"author":[{"@pid":"79/6801","text":"Helal Chowdhury"},{"@pid":"24/10905","text":"Ari Pouttu"},{"@pid":"27/3847","text":"Marcos D. Katz"}]},"title":"Performance Analysis of Visible Light Communications-Based Hotspots in Indoor and Outdoor Environments.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"755-768","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ChowdhuryPK17","doi":"10.1007/S11277-014-2226-9","ee":"https://doi.org/10.1007/s11277-014-2226-9","url":"https://dblp.org/rec/journals/wpc/ChowdhuryPK17"}, "url":"URL#2865523" }, { "@score":"1", "@id":"2865529", "info":{"authors":{"author":[{"@pid":"75/2977","text":"Nuno Cota"},{"@pid":"90/4137","text":"António Serrador"},{"@pid":"42/55-1","text":"Pedro Vieira 0001"},{"@pid":"143/1526","text":"Ana Rita Beire"},{"@pid":"01/5904","text":"António Rodrigues"}]},"title":"On the Use of Okumura-Hata Propagation Model on Railway Communications.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"725-736","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/CotaSVBR17","doi":"10.1007/S11277-014-2224-Y","ee":"https://doi.org/10.1007/s11277-014-2224-y","url":"https://dblp.org/rec/journals/wpc/CotaSVBR17"}, "url":"URL#2865529" }, { "@score":"1", "@id":"2865549", "info":{"authors":{"author":[{"@pid":"65/4014","text":"Maja Delibasic"},{"@pid":"47/2411","text":"Milica Pejanovic-Djurisic"}]},"title":"Dual-Hop Amplify-and-Forward Relay System Over Non-identical Ricean Fading Channels.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"675-686","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/DelibasicP17a","doi":"10.1007/S11277-014-2221-1","ee":"https://doi.org/10.1007/s11277-014-2221-1","url":"https://dblp.org/rec/journals/wpc/DelibasicP17a"}, "url":"URL#2865549" }, { "@score":"1", "@id":"2865608", "info":{"authors":{"author":[{"@pid":"143/1343","text":"Jessica Acevedo Flores"},{"@pid":"09/8861","text":"Daniel Robalo"},{"@pid":"19/1122","text":"Fernando J. Velez"}]},"title":"Transmitted Power Formulation for the Optimization of Spectrum Aggregation in LTE-A over 800 MHz and 2 GHz Frequency Bands.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"833-852","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/FloresRV17","doi":"10.1007/S11277-014-2231-Z","ee":"https://doi.org/10.1007/s11277-014-2231-z","url":"https://dblp.org/rec/journals/wpc/FloresRV17"}, "url":"URL#2865608" }, { "@score":"1", "@id":"2865646", "info":{"authors":{"author":[{"@pid":"45/8436","text":"David González González"},{"@pid":"19/4265","text":"Mario García-Lozano"},{"@pid":"70/5255","text":"Silvia Ruiz-Boqué"}]},"title":"Intercell Interference Coordination for Control Channels in LTE and LTE-A: An Optimization Scheme Based on Evolutionary Algorithms.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"687-708","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/GonzalezGR17","doi":"10.1007/S11277-014-2222-0","ee":"https://doi.org/10.1007/s11277-014-2222-0","url":"https://dblp.org/rec/journals/wpc/GonzalezGR17"}, "url":"URL#2865646" }, { "@score":"1", "@id":"2865681", "info":{"authors":{"author":[{"@pid":"195/4348","text":"Myoung-Seok Han"},{"@pid":"11/5165","text":"Sang Jun Lee"},{"@pid":"176/8404","text":"Woo-Sik Bae"}]},"title":"A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"245-254","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/HanLB17","doi":"10.1007/S11277-016-3884-6","ee":"https://doi.org/10.1007/s11277-016-3884-6","url":"https://dblp.org/rec/journals/wpc/HanLB17"}, "url":"URL#2865681" }, { "@score":"1", "@id":"2865707", "info":{"authors":{"author":[{"@pid":"195/6707","text":"Yeong Taek Hong"},{"@pid":"97/6964","text":"Young-Sup Hwang"},{"@pid":"195/6657","text":"Sang Hyuk Nam"},{"@pid":"195/6592","text":"Dan Hee Lee"},{"@pid":"195/6544","text":"Seong Jin Lee"},{"@pid":"24/6968","text":"Jae Hwan Lee"},{"@pid":"64/5256","text":"Sung Jo Kim"}]},"title":"A Seamless Screen Switching Scheme for N-Screen Services Based on Context Awareness.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"553-570","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/HongHNLLLK17","doi":"10.1007/S11277-016-3204-1","ee":"https://doi.org/10.1007/s11277-016-3204-1","url":"https://dblp.org/rec/journals/wpc/HongHNLLLK17"}, "url":"URL#2865707" }, { "@score":"1", "@id":"2865708", "info":{"authors":{"author":[{"@pid":"177/5487","text":"Chang Hyun Hong"},{"@pid":"74/3055","text":"Trang Nguyen"},{"@pid":"127/4971","text":"Nam Tuan Le"},{"@pid":"30/3581","text":"Yeong Min Jang"}]},"title":"Modulation and Coding Scheme (MCS) for Indoor Image Sensor Communication System.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"987-1003","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/HongNLJ17","doi":"10.1007/S11277-017-3977-X","ee":"https://doi.org/10.1007/s11277-017-3977-x","url":"https://dblp.org/rec/journals/wpc/HongNLJ17"}, "url":"URL#2865708" }, { "@score":"1", "@id":"2865733", "info":{"authors":{"author":[{"@pid":"197/3219","text":"Taemin Hwang"},{"@pid":"197/3158","text":"Yujin Nam"},{"@pid":"05/7533","text":"Jaewoo So"},{"@pid":"34/205","text":"Minsoo Na"},{"@pid":"52/10042","text":"Changsoon Choi"}]},"title":"An Energy-Efficient Data Reporting Scheme Based on Spectrum Sensing in Wireless Sensor Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"949-967","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/HwangNSNC17","doi":"10.1007/S11277-017-3962-4","ee":"https://doi.org/10.1007/s11277-017-3962-4","url":"https://dblp.org/rec/journals/wpc/HwangNSNC17"}, "url":"URL#2865733" }, { "@score":"1", "@id":"2865747", "info":{"authors":{"author":[{"@pid":"83/1662","text":"Koichi Ishihara"},{"@pid":"13/9196","text":"Tomoki Murakami"},{"@pid":"33/987","text":"Yusuke Asai"},{"@pid":"79/3499","text":"Yasushi Takatori"},{"@pid":"35/4940","text":"Masato Mizoguchi"}]},"title":"Cooperative Inter-cell Interference Mitigation Scheme with Downlink MU-MIMO Beamforming for Dense Wireless LAN Environment.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"661-674","year":"2017","type":"Journal Articles","access":"open","key":"journals/wpc/IshiharaMATM17","doi":"10.1007/S11277-014-2220-2","ee":"https://doi.org/10.1007/s11277-014-2220-2","url":"https://dblp.org/rec/journals/wpc/IshiharaMATM17"}, "url":"URL#2865747" }, { "@score":"1", "@id":"2865762", "info":{"authors":{"author":[{"@pid":"15/4987","text":"Yoon-Su Jeong"},{"@pid":"129/4946","text":"Seung-Soo Shin"}]},"title":"An Efficient Access Reduction Scheme of Big Data Based on Total Probability Theory.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"7-19","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/JeongS17","doi":"10.1007/S11277-016-3920-6","ee":"https://doi.org/10.1007/s11277-016-3920-6","url":"https://dblp.org/rec/journals/wpc/JeongS17"}, "url":"URL#2865762" }, { "@score":"1", "@id":"2865763", "info":{"authors":{"author":[{"@pid":"77/4309","text":"Seong-Ho Jeong"},{"@pid":"93/125","text":"Zary Segall"},{"@pid":"07/6378","text":"Fan Wu"}]},"title":"Foreword by Guest Editors for the Special Issue on the 2015 ICUFN (Ubiquitous and Future Networks).","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"877-881","year":"2017","type":"Journal Articles","access":"open","key":"journals/wpc/JeongSW17","doi":"10.1007/S11277-017-4070-1","ee":"https://doi.org/10.1007/s11277-017-4070-1","url":"https://dblp.org/rec/journals/wpc/JeongSW17"}, "url":"URL#2865763" }, { "@score":"1", "@id":"2865773", "info":{"authors":{"author":[{"@pid":"38/889","text":"Hong Jin"},{"@pid":"163/1803","text":"GuoZhong Li"},{"@pid":"172/5188","text":"Seong-Taek Park"},{"@pid":"18/8826","text":"Jiali Zhu"}]},"title":"The Effects of Consumer Characteristics on Information Searching Behavior in Wireless Mobile SNS: Using SEM Analysis.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"81-96","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/JinLPZ17","doi":"10.1007/S11277-016-3523-2","ee":"https://doi.org/10.1007/s11277-016-3523-2","url":"https://dblp.org/rec/journals/wpc/JinLPZ17"}, "url":"URL#2865773" }, { "@score":"1", "@id":"2865786", "info":{"authors":{"author":[{"@pid":"176/8216","text":"Hyun Mi Jung"},{"@pid":"48/8765","text":"Haeng-Gon Lee"},{"@pid":"180/7476","text":"Jang Won Choi 0001"}]},"title":"Efficient Malicious Packet Capture Through Advanced DNS Sinkhole.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"21-34","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/JungLC17","doi":"10.1007/S11277-016-3443-1","ee":"https://doi.org/10.1007/s11277-016-3443-1","url":"https://dblp.org/rec/journals/wpc/JungLC17"}, "url":"URL#2865786" }, { "@score":"1", "@id":"2865798", "info":{"authors":{"author":[{"@pid":"195/4283","text":"Jongho Kang"},{"@pid":"195/4386","text":"Inhyouk Hyong"}]},"title":"Changes in Electromyographic Activity of Lumbar Paraspinal Muscles According to Type of Inverted-Spinal-Traction.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"35-45","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KangH17","doi":"10.1007/S11277-016-3881-9","ee":"https://doi.org/10.1007/s11277-016-3881-9","url":"https://dblp.org/rec/journals/wpc/KangH17"}, "url":"URL#2865798" }, { "@score":"1", "@id":"2865808", "info":{"authors":{"author":[{"@pid":"156/1369","text":"Marimuthu Karuppiah"},{"@pid":"06/10193","text":"Saru Kumari"},{"@pid":"63/6031-2","text":"Xiong Li 0002"},{"@pid":"07/6378-3","text":"Fan Wu 0003"},{"@pid":"39/871","text":"Ashok Kumar Das"},{"@pid":"69/821","text":"Muhammad Khurram Khan"},{"@pid":"04/5469-1","text":"R. Saravanan 0001"},{"@pid":"191/5887","text":"Sayantani Basu"}]},"title":"A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"383-407","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KaruppiahKLWDKS17","doi":"10.1007/S11277-016-3672-3","ee":"https://doi.org/10.1007/s11277-016-3672-3","url":"https://dblp.org/rec/journals/wpc/KaruppiahKLWDKS17"}, "url":"URL#2865808" }, { "@score":"1", "@id":"2865845", "info":{"authors":{"author":{"@pid":"129/4268","text":"JeongYeon Kim"}},"title":"Efficiency of Paid Authentication Methods for Mobile Devices.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"543-551","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/Kim17","doi":"10.1007/S11277-016-3286-9","ee":"https://doi.org/10.1007/s11277-016-3286-9","url":"https://dblp.org/rec/journals/wpc/Kim17"}, "url":"URL#2865845" }, { "@score":"1", "@id":"2865847", "info":{"authors":{"author":[{"@pid":"161/7054","text":"Min-Nyeon Kim"},{"@pid":"195/4262","text":"Soon-Hwa Baek"}]},"title":"A Study on Ubiquitous Environments Based on the Animal and Plant Management System in Green House.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"175-185","year":"2017","type":"Journal Articles","access":"open","key":"journals/wpc/KimB17","doi":"10.1007/S11277-016-3924-2","ee":"https://doi.org/10.1007/s11277-016-3924-2","url":"https://dblp.org/rec/journals/wpc/KimB17"}, "url":"URL#2865847" }, { "@score":"1", "@id":"2865849", "info":{"authors":{"author":[{"@pid":"172/5162","text":"Joo-Chang Kim"},{"@pid":"92/852","text":"Kyungyong Chung"}]},"title":"Depression Index Service Using Knowledge Based Crowdsourcing in Smart Health.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"255-268","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KimC17","doi":"10.1007/S11277-016-3923-3","ee":"https://doi.org/10.1007/s11277-016-3923-3","url":"https://dblp.org/rec/journals/wpc/KimC17"}, "url":"URL#2865849" }, { "@score":"1", "@id":"2865850", "info":{"authors":{"author":[{"@pid":"24/4665","text":"Jongsung Kim"},{"@pid":"31/1108","text":"Naveen K. Chilamkurti"}]},"title":"Special Issue: Advanced Technologies and Applications for Future Wireless and Mobile Communication Systems.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"285-286","year":"2017","type":"Journal Articles","access":"open","key":"journals/wpc/KimC17a","doi":"10.1007/S11277-017-4046-1","ee":"https://doi.org/10.1007/s11277-017-4046-1","url":"https://dblp.org/rec/journals/wpc/KimC17a"}, "url":"URL#2865850" }, { "@score":"1", "@id":"2865855", "info":{"authors":{"author":[{"@pid":"138/7082-5","text":"Dae-Young Kim 0005"},{"@pid":"192/3563","text":"Minwoo Jung"}]},"title":"Data Transmission and Network Architecture in Long Range Low Power Sensor Networks for IoT.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"119-129","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KimJ17","doi":"10.1007/S11277-016-3482-7","ee":"https://doi.org/10.1007/s11277-016-3482-7","url":"https://dblp.org/rec/journals/wpc/KimJ17"}, "url":"URL#2865855" }, { "@score":"1", "@id":"2865856", "info":{"authors":{"author":[{"@pid":"66/10267","text":"BeomSeok Kim"},{"@pid":"56/4217","text":"Seokhoon Kim"}]},"title":"An AHP-Based Interface and Channel Selection for Multi-channel MAC Protocol in IoT Ecosystem.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"97-118","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KimK17","doi":"10.1007/S11277-016-3493-4","ee":"https://doi.org/10.1007/s11277-016-3493-4","url":"https://dblp.org/rec/journals/wpc/KimK17"}, "url":"URL#2865856" }, { "@score":"1", "@id":"2865862", "info":{"authors":{"author":[{"@pid":"55/394","text":"Dong Kyoo Kim"},{"@pid":"136/8115","text":"Do Wook Kang"},{"@pid":"54/9241-1","text":"Yang Sun Lee 0001"}]},"title":"Experimental Results for an Indoor Localization Method based on Angle-Delay Signatures.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"337-347","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KimKL17","doi":"10.1007/S11277-015-3148-X","ee":"https://doi.org/10.1007/s11277-015-3148-x","url":"https://dblp.org/rec/journals/wpc/KimKL17"}, "url":"URL#2865862" }, { "@score":"1", "@id":"2865863", "info":{"authors":{"author":[{"@pid":"129/0146","text":"Kyoung-nam Kim"},{"@pid":"147/0464","text":"MyounJae Lee"}]},"title":"Flocking in Interpretation with Visual Art Design Principles.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"211-222","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KimL17","doi":"10.1007/S11277-016-3925-1","ee":"https://doi.org/10.1007/s11277-016-3925-1","url":"https://dblp.org/rec/journals/wpc/KimL17"}, "url":"URL#2865863" }, { "@score":"1", "@id":"2865874", "info":{"authors":{"author":[{"@pid":"83/8789","text":"Enis Kocan"},{"@pid":"47/2411","text":"Milica Pejanovic-Djurisic"}]},"title":"Performance Improvement of Dual-Hop OFDM Decode-and-Forward Relay System.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"769-778","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/KocanP17a","doi":"10.1007/S11277-014-2227-8","ee":"https://doi.org/10.1007/s11277-014-2227-8","url":"https://dblp.org/rec/journals/wpc/KocanP17a"}, "url":"URL#2865874" }, { "@score":"1", "@id":"2865910", "info":{"authors":{"author":{"@pid":"12/6994","text":"Jae Moon Lee"}},"title":"Fast k-Nearest Neighbor Searching in Static Objects.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"147-160","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/Lee17","doi":"10.1007/S11277-016-3524-1","ee":"https://doi.org/10.1007/s11277-016-3524-1","url":"https://dblp.org/rec/journals/wpc/Lee17"}, "url":"URL#2865910" }, { "@score":"1", "@id":"2865915", "info":{"authors":{"author":[{"@pid":"61/5584","text":"Sungwon Lee"},{"@pid":"21/1517","text":"Yonghwan Jeong"},{"@pid":"178/2749","text":"Eunbae Moon"},{"@pid":"66/2701","text":"Dongkyun Kim"}]},"title":"An Efficient MOP Decision Method Using Hop Interval for RPL-Based Underwater Sensor Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"1027-1041","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/LeeJMK17","doi":"10.1007/S11277-017-3964-2","ee":"https://doi.org/10.1007/s11277-017-3964-2","url":"https://dblp.org/rec/journals/wpc/LeeJMK17"}, "url":"URL#2865915" }, { "@score":"1", "@id":"2865918", "info":{"authors":{"author":[{"@pid":"137/1307","text":"SeungJin Lee"},{"@pid":"38/8932","text":"JaMee Kim"},{"@pid":"17/762","text":"WonGyu Lee"}]},"title":"Analysis of Factors Affecting Achievement in Maker Programming Education in the Age of Wireless Communication.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"187-209","year":"2017","type":"Journal Articles","access":"open","key":"journals/wpc/LeeKL17","doi":"10.1007/S11277-016-3450-2","ee":"https://doi.org/10.1007/s11277-016-3450-2","url":"https://dblp.org/rec/journals/wpc/LeeKL17"}, "url":"URL#2865918" }, { "@score":"1", "@id":"2865923", "info":{"authors":{"author":[{"@pid":"35/717","text":"Keon-Myung Lee"},{"@pid":"43/2492","text":"Sang Yeon Lee"},{"@pid":"50/6751","text":"Kyung Mi Lee"},{"@pid":"80/4296-2","text":"Sang Ho Lee 0002"}]},"title":"Density and Frequency-Aware Cluster Identification for Spatio-Temporal Sequence Data.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"47-65","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/LeeLLL17","doi":"10.1007/S11277-016-3937-X","ee":"https://doi.org/10.1007/s11277-016-3937-x","url":"https://dblp.org/rec/journals/wpc/LeeLLL17"}, "url":"URL#2865923" }, { "@score":"1", "@id":"2865924", "info":{"authors":{"author":[{"@pid":"166/1848","text":"Hyojik Lee"},{"@pid":"166/1811","text":"Onechul Na"},{"@pid":"49/10312","text":"Yang-Hoon Kim"},{"@pid":"40/2195","text":"Hangbae Chang"}]},"title":"A Study on Designing Public Safety Service for Internet of Things Environment.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"447-459","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/LeeNKC17","doi":"10.1007/S11277-016-3230-Z","ee":"https://doi.org/10.1007/s11277-016-3230-z","url":"https://dblp.org/rec/journals/wpc/LeeNKC17"}, "url":"URL#2865924" }, { "@score":"1", "@id":"2865928", "info":{"authors":{"author":[{"@pid":"143/5307","text":"Xiaoying Lei"},{"@pid":"41/3877","text":"Seung Hyong Rhee"}]},"title":"Performance Improvement of Sub 1 GHz WLANs for Future IoT Environments.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"933-947","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/LeiR17","doi":"10.1007/S11277-017-3947-3","ee":"https://doi.org/10.1007/s11277-017-3947-3","url":"https://dblp.org/rec/journals/wpc/LeiR17"}, "url":"URL#2865928" }, { "@score":"1", "@id":"2865941", "info":{"authors":{"author":[{"@pid":"68/7207-1","text":"Xujie Li 0001"},{"@pid":"197/3272","text":"Ziya Wang"},{"@pid":"10/5415","text":"Ying Sun"},{"@pid":"174/1818","text":"Yan Gu"},{"@pid":"10/7741","text":"Jurong Hu"}]},"title":"Mathematical Characteristics of Uplink and Downlink Interference Regions in D2D Communications Underlaying Cellular Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"917-932","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/LiWSGH17","doi":"10.1007/S11277-016-3936-Y","ee":"https://doi.org/10.1007/s11277-016-3936-y","url":"https://dblp.org/rec/journals/wpc/LiWSGH17"}, "url":"URL#2865941" }, { "@score":"1", "@id":"2865959", "info":{"authors":{"author":{"@pid":"132/8591","text":"Vlatko Lipovac"}},"title":"Practical Consistency Between Bit-Error and Block-Error Performance Metrics up to Application Layer.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"779-793","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/Lipovac17","doi":"10.1007/S11277-014-2228-7","ee":"https://doi.org/10.1007/s11277-014-2228-7","url":"https://dblp.org/rec/journals/wpc/Lipovac17"}, "url":"URL#2865959" }, { "@score":"1", "@id":"2865960", "info":{"authors":{"author":[{"@pid":"119/6007","text":"Adriana Lipovac"},{"@pid":"132/8591","text":"Vlatko Lipovac"},{"@pid":"29/901","text":"Mirza Hamza"}]},"title":"Verification of OFDM Error Floor Prediction in Time-Dispersive LTE FDD DL Channel.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"853-875","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/LipovacLH17","doi":"10.1007/S11277-014-2232-Y","ee":"https://doi.org/10.1007/s11277-014-2232-y","url":"https://dblp.org/rec/journals/wpc/LipovacLH17"}, "url":"URL#2865960" }, { "@score":"1", "@id":"2866027", "info":{"authors":{"author":[{"@pid":"18/6956","text":"Masaki Matsuoka"},{"@pid":"43/10518","text":"Ryota Yoshizawa"},{"@pid":"02/1176","text":"Hideki Ochiai"}]},"title":"Peak and Average Power Reduction of OFDM Signals Based on Trellis Shaping with Controllable Region Expansion.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"737-754","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/MatsuokaYO17","doi":"10.1007/S11277-014-2225-X","ee":"https://doi.org/10.1007/s11277-014-2225-x","url":"https://dblp.org/rec/journals/wpc/MatsuokaYO17"}, "url":"URL#2866027" }, { "@score":"1", "@id":"2866073", "info":{"authors":{"author":[{"@pid":"77/5441","text":"Hyung-Jin Mun"},{"@pid":"81/9705","text":"Yongzhen Li"}]},"title":"Secure Short URL Generation Method that Recognizes Risk of Target URL.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"269-283","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/MunL17","doi":"10.1007/S11277-016-3866-8","ee":"https://doi.org/10.1007/s11277-016-3866-8","url":"https://dblp.org/rec/journals/wpc/MunL17"}, "url":"URL#2866073" }, { "@score":"1", "@id":"2866074", "info":{"authors":{"author":[{"@pid":"187/8776","text":"Tewodros Legesse Munea"},{"@pid":"174/2864","text":"I Luk Kim"},{"@pid":"15/5924","text":"Taeshik Shon"}]},"title":"Design and Implementation of Fuzzing Framework Based on IoT Applications.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"365-382","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/MuneaKS17","doi":"10.1007/S11277-016-3322-9","ee":"https://doi.org/10.1007/s11277-016-3322-9","url":"https://dblp.org/rec/journals/wpc/MuneaKS17"}, "url":"URL#2866074" }, { "@score":"1", "@id":"2866096", "info":{"authors":{"author":[{"@pid":"28/4650","text":"Michele Nati"},{"@pid":"31/5291","text":"Alexander Gluhak"},{"@pid":"37/3612","text":"Jaroslaw Domaszewicz"},{"@pid":"95/4898","text":"Spyros Lalis"},{"@pid":"59/3145","text":"Klaus Moessner"}]},"title":"Lessons from SmartCampus: External Experimenting with User-Centric Internet-of-Things Testbed.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"709-723","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/NatiGDLM17","doi":"10.1007/S11277-014-2223-Z","ee":"https://doi.org/10.1007/s11277-014-2223-z","url":"https://dblp.org/rec/journals/wpc/NatiGDLM17"}, "url":"URL#2866096" }, { "@score":"1", "@id":"2866102", "info":{"authors":{"author":[{"@pid":"197/3328","text":"Duy-Linh Nguyen"},{"@pid":"197/3233","text":"Tri-Hai Nguyen"},{"@pid":"05/11072","text":"Trong-Hop Do"},{"@pid":"26/2046","text":"Myungsik Yoo"}]},"title":"Probability-Based Multi-hop Diffusion Method for Influence Maximization in Social Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"903-916","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/NguyenNDY17","doi":"10.1007/S11277-016-3939-8","ee":"https://doi.org/10.1007/s11277-016-3939-8","url":"https://dblp.org/rec/journals/wpc/NguyenNDY17"}, "url":"URL#2866102" }, { "@score":"1", "@id":"2866174", "info":{"authors":{"author":[{"@pid":"195/4446","text":"D. Surya Prabha"},{"@pid":"02/6960-1","text":"J. Satheeshkumar 0001"}]},"title":"An Efficient Image Contrast Enhancement Algorithm Using Genetic Algorithm and Fuzzy Intensification Operator.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"223-244","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/PrabhaK17","doi":"10.1007/S11277-016-3536-X","ee":"https://doi.org/10.1007/s11277-016-3536-x","url":"https://dblp.org/rec/journals/wpc/PrabhaK17"}, "url":"URL#2866174" }, { "@score":"1", "@id":"2866234", "info":{"authors":{"author":[{"@pid":"180/4995","text":"M. Ranjeeth 0001"},{"@pid":"166/2697","text":"S. Anuradha"}]},"title":"Threshold Based Censoring of Cognitive Radios in Rician Fading Channel.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"409-430","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/RanjeethA17","doi":"10.1007/S11277-016-3440-4","ee":"https://doi.org/10.1007/s11277-016-3440-4","url":"https://dblp.org/rec/journals/wpc/RanjeethA17"}, "url":"URL#2866234" }, { "@score":"1", "@id":"2866256", "info":{"authors":{"author":[{"@pid":"195/4448","text":"Sunkyung Rhyu"},{"@pid":"122/8525","text":"Sang-Yeob Oh"}]},"title":"ICT-Based Wireless Personal Computing.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"1-5","year":"2017","type":"Journal Articles","access":"open","key":"journals/wpc/RhyuO17","doi":"10.1007/S11277-017-3955-3","ee":"https://doi.org/10.1007/s11277-017-3955-3","url":"https://dblp.org/rec/journals/wpc/RhyuO17"}, "url":"URL#2866256" }, { "@score":"1", "@id":"2866257", "info":{"authors":{"author":[{"@pid":"129/2701","text":"Faisal Riaz"},{"@pid":"61/2979","text":"Imran Shafi"},{"@pid":"74/7537","text":"Sohail Jabbar"},{"@pid":"75/2950","text":"Shehzad Khalid"},{"@pid":"73/4067","text":"Seungmin Rho"}]},"title":"A Novel White Space Optimization Scheme Using Memory Enabled Genetic Algorithm in Cognitive Vehicular Communication.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"287-309","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/RiazSJKR17","doi":"10.1007/S11277-015-3117-4","ee":"https://doi.org/10.1007/s11277-015-3117-4","url":"https://dblp.org/rec/journals/wpc/RiazSJKR17"}, "url":"URL#2866257" }, { "@score":"1", "@id":"2866274", "info":{"authors":{"author":[{"@pid":"175/6914","text":"Youngkwon Ryu"},{"@pid":"143/6386","text":"Jeong Gon Kim"}]},"title":"Enhanced Signal Detection in 3GPP LTE System with Successive Interference Cancellation.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"1089-1099","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/RyuK17","doi":"10.1007/S11277-017-3952-6","ee":"https://doi.org/10.1007/s11277-017-3952-6","url":"https://dblp.org/rec/journals/wpc/RyuK17"}, "url":"URL#2866274" }, { "@score":"1", "@id":"2866293", "info":{"authors":{"author":[{"@pid":"28/10766","text":"Yuki Sawada"},{"@pid":"30/1634","text":"Yusuke Arai"},{"@pid":"98/1693","text":"Kanemitsu Ootsu"},{"@pid":"93/2272","text":"Takashi Yokota"},{"@pid":"48/4504","text":"Takeshi Ohkawa"}]},"title":"Performance of Android Cluster System Allowing Dynamic Node Reconfiguration.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"1067-1087","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/SawadaAOYO17","doi":"10.1007/S11277-017-3978-9","ee":"https://doi.org/10.1007/s11277-017-3978-9","url":"https://dblp.org/rec/journals/wpc/SawadaAOYO17"}, "url":"URL#2866293" }, { "@score":"1", "@id":"2866348", "info":{"authors":{"author":[{"@pid":"15/5412","text":"Lin Shi"},{"@pid":"54/1969","text":"Sang-Jo Yoo"}]},"title":"Distributed Fair Resource Allocation for Cognitive Femtocell Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"883-902","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ShiY17","doi":"10.1007/S11277-016-3935-Z","ee":"https://doi.org/10.1007/s11277-016-3935-z","url":"https://dblp.org/rec/journals/wpc/ShiY17"}, "url":"URL#2866348" }, { "@score":"1", "@id":"2866380", "info":{"authors":{"author":[{"@pid":"183/5373","text":"Dat Phuc Tran Song"},{"@pid":"x/NaixueXiong","text":"Neal Naixue Xiong"},{"@pid":"93/3417","text":"Changhoon Lee"}]},"title":"Cryptanalysis of the XO-64 Suitable for Wireless Systems.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"589-600","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/SongXL17","doi":"10.1007/S11277-016-3663-4","ee":"https://doi.org/10.1007/s11277-016-3663-4","url":"https://dblp.org/rec/journals/wpc/SongXL17"}, "url":"URL#2866380" }, { "@score":"1", "@id":"2866399", "info":{"authors":{"author":[{"@pid":"50/8861","text":"Essi Suikkanen"},{"@pid":"65/5662","text":"Markku J. Juntti"}]},"title":"Study of Adaptive Detection and Channel Estimation for MIMO-OFDM Systems.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"811-831","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/SuikkanenJ17","doi":"10.1007/S11277-014-2230-0","ee":"https://doi.org/10.1007/s11277-014-2230-0","url":"https://dblp.org/rec/journals/wpc/SuikkanenJ17"}, "url":"URL#2866399" }, { "@score":"1", "@id":"2866426", "info":{"authors":{"author":[{"@pid":"71/3020","text":"Faisal Tariq"},{"@pid":"d/LaurenceDooley","text":"Laurence Dooley"},{"@pid":"60/6899","text":"Ben Allen"},{"@pid":"47/10126","text":"Adrian S. Poulton"},{"@pid":"85/1448","text":"Enjie Liu"}]},"title":"A Cell Range Expansion Framework for Closed Access Femtocell Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"601-614","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/TariqDAPL17","doi":"10.1007/S11277-014-2216-Y","ee":"https://doi.org/10.1007/s11277-014-2216-y","url":"https://dblp.org/rec/journals/wpc/TariqDAPL17"}, "url":"URL#2866426" }, { "@score":"1", "@id":"2866436", "info":{"authors":{"author":[{"@pid":"197/3092","text":"Thanachai Thumthawatworn"},{"@pid":"197/3135","text":"Piyakul Tillapart"},{"@pid":"14/4159","text":"Pratit Santiprabhob"}]},"title":"Adaptive Multi-fuzzy Engines for Handover Decision in Heterogeneous Wireless Networks.","venue":"Wirel. Pers. Commun.","volume":"93","number":"4","pages":"1005-1026","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/ThumthawatwornT17","doi":"10.1007/S11277-017-3963-3","ee":"https://doi.org/10.1007/s11277-017-3963-3","url":"https://dblp.org/rec/journals/wpc/ThumthawatwornT17"}, "url":"URL#2866436" }, { "@score":"1", "@id":"2866481", "info":{"authors":{"author":[{"@pid":"143/1367","text":"Alexandru Vulpe"},{"@pid":"43/3635","text":"Albena Mihovska"},{"@pid":"79/8632","text":"Octavian Fratu"},{"@pid":"42/2497","text":"Simona Halunga"},{"@pid":"98/179","text":"Ramjee Prasad"}]},"title":"Admission Control and Scheduling Algorithm for Multi-carrier Systems.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"629-645","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/VulpeMFHP17","doi":"10.1007/S11277-014-2218-9","ee":"https://doi.org/10.1007/s11277-014-2218-9","url":"https://dblp.org/rec/journals/wpc/VulpeMFHP17"}, "url":"URL#2866481" }, { "@score":"1", "@id":"2866482", "info":{"authors":{"author":[{"@pid":"138/6914","text":"Liangtian Wan"},{"@pid":"32/4821","text":"Guangjie Han"},{"@pid":"55/7033","text":"Daqiang Zhang"},{"@pid":"160/9829","text":"Aohan Li"},{"@pid":"122/5371","text":"Naixing Feng"}]},"title":"Distributed DOA Estimation for Arbitrary Topology Structure of Mobile Wireless Sensor Network Using Cognitive Radio.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"431-445","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/WanHZLF17","doi":"10.1007/S11277-016-3172-5","ee":"https://doi.org/10.1007/s11277-016-3172-5","url":"https://dblp.org/rec/journals/wpc/WanHZLF17"}, "url":"URL#2866482" }, { "@score":"1", "@id":"2866495", "info":{"authors":{"author":[{"@pid":"94/3104-2","text":"Ying Wang 0002"},{"@pid":"195/6660","text":"Sachula Meng"},{"@pid":"161/8672","text":"Yongce Chen"},{"@pid":"168/0345","text":"Ruijin Sun"},{"@pid":"172/1336","text":"Xinshui Wang"},{"@pid":"09/1171-3","text":"Kai Sun 0003"}]},"title":"Multi-leader Multi-follower Stackelberg Game Based Dynamic Resource Allocation for Mobile Cloud Computing Environment.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"461-480","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/WangMCSWS17","doi":"10.1007/S11277-016-3351-4","ee":"https://doi.org/10.1007/s11277-016-3351-4","url":"https://dblp.org/rec/journals/wpc/WangMCSWS17"}, "url":"URL#2866495" }, { "@score":"1", "@id":"2866534", "info":{"authors":{"author":[{"@pid":"06/2422","text":"Yong Xie"},{"@pid":"66/521","text":"Libing Wu"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"},{"@pid":"95/5846-1","text":"Jian Shen 0001"}]},"title":"Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"523-541","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/XieWKS17","doi":"10.1007/S11277-016-3352-3","ee":"https://doi.org/10.1007/s11277-016-3352-3","url":"https://dblp.org/rec/journals/wpc/XieWKS17"}, "url":"URL#2866534" }, { "@score":"1", "@id":"2866565", "info":{"authors":{"author":[{"@pid":"70/2539","text":"Zhen Yang"},{"@pid":"87/3144","text":"Xing Liu"},{"@pid":"26/7696","text":"Zhongwei Hu"},{"@pid":"41/4644","text":"Chaowei Yuan"}]},"title":"Seamless Service Handoff Based on Delaunay Triangulation for Mobile Cloud Computing.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"795-809","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/YangLHY17","doi":"10.1007/S11277-014-2229-6","ee":"https://doi.org/10.1007/s11277-014-2229-6","url":"https://dblp.org/rec/journals/wpc/YangLHY17"}, "url":"URL#2866565" }, { "@score":"1", "@id":"2866573", "info":{"authors":{"author":[{"@pid":"58/2387","text":"Hyun Yoo"},{"@pid":"92/852","text":"Kyungyong Chung"}]},"title":"PHR Based Diabetes Index Service Model Using Life Behavior Analysis.","venue":"Wirel. Pers. Commun.","volume":"93","number":"1","pages":"161-174","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/YooC17","doi":"10.1007/S11277-016-3715-9","ee":"https://doi.org/10.1007/s11277-016-3715-9","url":"https://dblp.org/rec/journals/wpc/YooC17"}, "url":"URL#2866573" }, { "@score":"1", "@id":"2866581", "info":{"authors":{"author":[{"@pid":"46/2181-5","text":"Yang Yu 0005"},{"@pid":"73/6192","text":"Ziyan Jia"},{"@pid":"195/6646","text":"Weige Tao"},{"@pid":"122/2421-1","text":"Bo Xue 0001"},{"@pid":"93/3417","text":"Changhoon Lee"}]},"title":"An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things.","venue":"Wirel. Pers. Commun.","volume":"93","number":"2","pages":"571-587","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/YuJTXL17","doi":"10.1007/S11277-016-3802-Y","ee":"https://doi.org/10.1007/s11277-016-3802-y","url":"https://dblp.org/rec/journals/wpc/YuJTXL17"}, "url":"URL#2866581" }, { "@score":"1", "@id":"2866583", "info":{"authors":{"author":[{"@pid":"69/10566","text":"Xiaoxue Yu"},{"@pid":"16/7884","text":"Motoharu Matsuura"},{"@pid":"66/5514","text":"Yasushi Yamao"}]},"title":"Composite Effect of E/O Nonlinearity and Optical Echo on EPWM-OFDM Transmission in Radio Over Fiber Channel.","venue":"Wirel. Pers. Commun.","volume":"93","number":"3","pages":"647-660","year":"2017","type":"Journal Articles","access":"closed","key":"journals/wpc/YuMY17","doi":"10.1007/S11277-014-2219-8","ee":"https://doi.org/10.1007/s11277-014-2219-8","url":"https://dblp.org/rec/journals/wpc/YuMY17"}, "url":"URL#2866583" } ] } } } )