Advanced
Insert title here
If you want submit your manuscript to this journal, click the journal title.
Journal Info
Aims&Scope
Editorial
For Author
Current
Archive
 Archive
Volume 8(12); December 2014
1.
A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems

Gunes, Volkan;Peter, Steffen;Givargis, Tony;Vahid, Frank;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4242-4268
2.
Temporary Access Selection Technology in WIFI Networks

Lu, Yang;Tan, Xuezhi;Mo, Yun;Ma, Lin;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4269-4292
3.
Intervenient Stackelberg Game based Bandwidth Allocation Scheme for Hierarchical Wireless Networks

Kim, Sungwook;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4293-4304
4.
Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization

Long, Wei;Gao, Hui;Lv, Tiejun;Yuen, Chau;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4305-4323
5.
Throughput of Coded DS CDMA/Unslotted ALOHA Networks with Variable Length Data Traffic and Two User Classes in Rayleigh Fading FSMC Model

Tseng, Shu-Ming;Chiang, Li-Hsin;Wang, Yung-Chung;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4324-4342
6.
Efficient Multicast Routing on BCube-Based Data Centers

Xie, Junjie;Guo, Deke;Xu, Jia;Luo, Lailong;Teng, Xiaoqiang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4343-4355
7.
Resource Reservation to Support Service Continuity in OFDMA Systems

Lee, Jongchan;Lee, Moonho;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4356-4371
8.
Distributed task allocation of mobile robotic sensor networks with guaranteed connectivity

Mi, Zhenqiang;Yu, Ruochen;Yi, Xiangtian;Yang, Yang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4372-4388
9.
Optimal Stochastic Policies in a network coding capable Ad Hoc Networks

Oh, Hayoung;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4389-4410
10.
Lightweight Multicast Routing Based on Stable Core for MANETs

Al-Hemyari, Abdulmalek;Ismail, Mahamod;Hassan, Rosilah;Saeed, Sabri;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4411-4431
11.
Performance Optimization of Two-Way AF Relaying in Asymmetric Fading Channels

Qi, Yanyan;Wang, Xiaoxiang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4432-4450
12.
Joint Radio Selection and Relay Scheme through Optimization Model in Multi-Radio Sensor Networks

Lee, HyungJune;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4451-4466
13.
A Technical Approach for Suggesting Research Directions in Telecommunications Policy

Oh, Junseok;Lee, Bong Gyou;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4467-4488
14.
Lane Detection and Tracking Using Classification in Image Sequences

Lim, Sungsoo;Lee, Daeho;Park, Youngtae;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4489-4501
15.
Colour Constancy using Grey Edge Framework and Image Component analysis

Savc, Martin;Potocnik, Bozidar;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4502-4512
16.
WLSD: A Perceptual Stimulus Model Based Shape Descriptor

Li, Jiatong;Zhao, Baojun;Tang, Linbo;Deng, Chenwei;Han, Lu;Wu, Jinghui;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4513-4532
17.
A New Framework for Automatic Extraction of Key Frames Using DC Image Activity

Kim, Kang-Wook;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4533-4551
18.
A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4552-4567
19.
Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature

Ling, Chen;Ur-Rehman, Obaid;Zhang, Wenjun;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4568-4587
20.
A High-Quality Image Authentication Scheme for AMBTC-compressed Images

Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4588-4603
21.
Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

Kirsal-Ever, Yoney;Eneh, Agozie;Gemikonakli, Orhan;Mostarda, Leonardo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4604-4623
22.
Indicator Elimination for Locally Adaptive Scheme Using Data Hiding Technique

Chang, Hon-Hang;Chou, Yung-Chen;Shih, Timothy K.;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4624-4642
23.
A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4643-4660
24.
Trust Based Authentication and Key Establishment for Secure Routing in WMN

Akilarasu, G.;Shalinie, S. Mercy;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 12, 2014, pp. 4661-4676