Advanced
Insert title here
If you want submit your manuscript to this journal, click the journal title.
Journal Info
Aims&Scope
Editorial
For Author
Current
Archive
 Archive
Volume 8(7); July 2014
1.
Informed Spectrum Discovery in Cognitive Radio Networks using Proactive Out-of-Band Sensing

Jembre, Yalew Zelalem;Choi, Young-June;Paul, Rajib;Pak, Wooguil;Li, Zhetao;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2212-2230
2.
Game Theory based Dynamic Spectrum Allocation for Secondary Users in the Cell Edge of Cognitive Radio Networks

Jang, Sungjin;Kim, Jongbae;Byun, Jungwon;Shin, Yongtae;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2231-2245
3.
A Secure MQAM Scheme Based on Signal Constellation Hopping

Zhang, Yingxian;Liu, Aijun;Pan, Xiaofei;Ye, Zhan;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2246-2260
4.
Application Traffic Classification using PSS Signature

Ham, Jae-Hyun;An, Hyun-Min;Kim, Myung-Sup;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2261-2280
5.
SINR Pricing in Non Cooperative Power Control Game for Wireless Ad Hoc Networks

Suman, Sanjay Kumar;Kumar, Dhananjay;Bhagyalakshmi, L.;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2281-2301
6.
NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks

Ren, Ju;Zhang, Yaoxue;Lin, Xiaodong;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2302-2324
7.
Efficient Provisioning for Multicast Virtual Network under Single Regional Failure in Cloud-based Datacenters

Liao, Dan;Sun, Gang;Anand, Vishal;Yu, Hongfang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2325-2349
8.
Efficient Resource Allocation with Multiple Practical Constraints in OFDM-based Cooperative Cognitive Radio Networks

Yang, Xuezhou;Tang, Wei;Guo, Wei;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2350-2364
9.
Efficient Transmission Mode Selection Scheme for MIMO-based WLANs

Thapa, Anup;Kwak, Kyung Sup;Shin, Seokjoo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2365-2382
10.
Why do people visit social commerce sites but do not buy? The role of the scarcity heuristic as a momentary characteristic

Lee, Ho;Choi, Jaewon;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2383-2399
11.
Texture superpixels merging by color-texture histograms for color image segmentation

Sima, Haifeng;Guo, Ping;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2400-2419
12.
Multibiometrics fusion using $Acz{\acute{e}}l$-Alsina triangular norm

Wang, Ning;Lu, Li;Gao, Ge;Wang, Fanglin;Li, Shi;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2420-2433
13.
Enhancing Depth Accuracy on the Region of Interest in a Scene for Depth Image Based Rendering

Cho, Yongjoo;Seo, Kiyoung;Park, Kyoung Shin;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2434-2448
14.
GOP Adaptation Coding of H.264/SVC Based on Precise Positions of Video Cuts

Liu, Yunpeng;Wang, Renfang;Xu, Huixia;Sun, Dechao;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2449-2463
15.
Fast Encoder Design for Multi-view Video

Zhao, Fan;Liao, Kaiyang;Zhang, Erhu;Qu, Fangying;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2464-2479
16.
Hierarchical Age Estimation based on Dynamic Grouping and OHRank

Zhang, Li;Wang, Xianmei;Liang, Yuyu;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2480-2495
17.
Face recognition invariant to partial occlusions

Aisha, Azeem;Muhammad, Sharif;Hussain, Shah Jamal;Mudassar, Raza;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2496-2511
18.
Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection

Nam, Seung Yeob;Djuraev, Sirojiddin;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2512-2531
19.
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2532-2553
20.
Provably Secure Certificate-Based Signcryption Scheme without Pairings

Lu, Yang;Li, Jiguo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2554-2571
21.
Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees

Chang, Chin-Chen;Nguyen, Thai-Son;Lin, Chia-Chen;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 7, 2014, pp. 2572-2589