Advanced
Insert title here
If you want submit your manuscript to this journal, click the journal title.
Journal Info
Aims&Scope
Editorial
For Author
Current
Archive
 Archive
Volume 8(9); September 2014
1.
Performance Analysis of a Dense Device to Device Network

Kim, Seung-Yeon;Lim, Chi-Hun;Cho, Choong-Ho;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 2967-2981
2.
Modeling and Analysis of Load-Balancing Based on Base-Station CoMP with Guaranteed QoS

Feng, Lei;Li, WenJing;Yin, Mengjun;Qiu, Xuesong;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 2982-3003
3.
Efficient Joint Resource Allocation for OFDM-Based Cooperative Cognitive Radio Networks with Rate-Guarantee

Yang, Xuezhou;Tang, Wei;Guo, Wei;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3004-3015
4.
Performance Analysis of Distributed Antenna Systems with Antenna Selection over MIMO Rayleigh Fading Channel

Yu, Xiangbin;Tan, Wenting;Wang, Ying;Liu, Xiaoshuai;Rui, Yun;Chen, Ming;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3016-3033
5.
Dimensioning of linear and hierarchical wireless sensor networks for infrastructure monitoring with enhanced reliability

Ali, Salman;Qaisar, Saad Bin;Felemban, Emad A.;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3034-3055
6.
Linear network coding in convergecast of wireless sensor networks: friend or foe?

Tang, Zhenzhou;Wang, Hongyu;Hu, Qian;Ruan, Xiukai;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3056-3074
7.
Throughput Maximization for a Primary User with Cognitive Radio and Energy Harvesting Functions

Nguyen, Thanh-Tung;Koo, Insoo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3075-3093
8.
End-to-end Reliable Message Transmission Considering Load Balancing in Wireless Networks

Tran, Anh Tai;Kim, Myung Kyun;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3094-3109
9.
Analytic Throughput Model for Network Coded TCP in Wireless Mesh Networks

Zhang, Sanfeng;Lan, Xiang;Li, Shuang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3110-3125
10.
A Workflow Scheduling Technique Using Genetic Algorithm in Spot Instance-Based Cloud

Jung, Daeyong;Suh, Taeweon;Yu, Heonchang;Gil, JoonMin;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3126-3145
11.
Auto-Covariance Analysis for Depth Map Coding

Liu, Lei;Zhao, Yao;Lin, Chunyu;Bai, Huihui;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3146-3158
12.
The Effect of the Buffer Size in QoS for Multimedia and bursty Traffic: When an Upgrade Becomes a Downgrade

Sequeira, Luis;Fernandez-Navajas, Julian;Saldana, Jose;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3159-3176
13.
Improved image alignment algorithm based on projective invariant for aerial video stabilization

Yi, Meng;Guo, Bao-Long;Yan, Chun-Man;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3177-3195
14.
Video-based Height Measurements of Multiple Moving Objects

Jiang, Mingxin;Wang, Hongyu;Qiu, Tianshuang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3196-3210
15.
Constrained Sparse Concept Coding algorithm with application to image representation

Shu, Zhenqiu;Zhao, Chunxia;Huang, Pu;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3211-3230
16.
A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

Barakat, Tamer Mohamed;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3231-3249
17.
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3250-3265
18.
Related-Key Differential Attacks on CHESS-64

Luo, Wei;Guo, Jiansheng;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3266-3285
19.
A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality

Tsai, Yuan-Yu;Chen, Jian-Ting;Kuo, Yin-Chi;Chan, Chi-Shiang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 8, iss. 9, 2014, pp. 3286-3301