Advanced
Insert title here
If you want submit your manuscript to this journal, click the journal title.
Journal Info
Aims&Scope
Editorial
For Author
Current
Archive
 Archive
Volume 9(12); December 2015
1.
Challenges and solutions for Internet of Things Driven by IPv6

Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4739-4758
2.
CloudSwitch: A State-aware Monitoring Strategy Towards Energy-efficient and Performance-aware Cloud Data Centers

Elijorde, Frank;Lee, Jaewan;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4759-4775
3.
An Adaptive Virtual Machine Location Selection Mechanism in Distributed Cloud

Liu, Shukun;Jia, Weijia;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4776-4798
4.
Distributed Carrier Aggregation in Small Cell Networks: A Game-theoretic Approach

Zhang, Yuanhui;Kan, Chunrong;Xu, Kun;Xu, Yuhua;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4799-4818
5.
Spectrum Reuse Schemes with Power Control for Device-to-Device Communication in LTE-Advanced Cellular Network

Chhorn, Sok;Yoon, Seok-Ho;Seo, Si-O;Kim, Seung-Yeon;Cho, Choong-Ho;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4819-4834
6.
Geolocation Spectrum Database Assisted Optimal Power Allocation: Device-to-Device Communications in TV White Space

Xue, Zhen;Shen, Liang;Ding, Guoru;Wu, Qihui;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4835-4855
7.
A Virtual-Queue based Backpressure Scheduling Algorithm for Heterogeneous Multi-Hop Wireless Networks

Jiao, Zhenzhen;Zhang, Baoxian;Zheng, Jun;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4856-4871
8.
An Adaptive Companding Scheme for Peak-to-average Power Ratio Reduction in OFDM Systems

Mazahir, Sana;Sheikh, Shahzad Amin;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4872-4891
9.
Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation

Liu, Haifeng;Yang, Zhuo;Zhang, Jun;Bai, Xiaomei;Wang, Wei;Xia, Feng;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4892-4911
10.
Cache-Filter: A Cache Permission Policy for Information-Centric Networking

Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4912-4933
11.
A New Robust Signal Recognition Approach Based on Holder Cloud Features under Varying SNR Environment

Li, Jingchao;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4934-4949
12.
Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud

Li, Qing;Yang, Qinghai;He, Qingsu;Kwak, Kyung Sup;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4950-4966
13.
Tensor-Based Channel Estimation Approach for One-Way Multi-Hop Relaying Communications

Li, Shuangzhi;Mu, Xiaomin;Guo, Xin;Yang, Jing;Zhang, Jiankang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4967-4986
14.
Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

Kumari, Shipra;Om, Hari;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 4987-5014
15.
Transceiver Optimization for the Multi-Antenna Downlink in MIMO Cognitive System

Zhu, Wentao;Yang, Jingbo;Jia, Tingting;Liu, Xu;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5015-5027
16.
Handover Management Based on Loca-tion Based Services in F-HMIPv6 Net-works

Nashaat, Heba;Rizk, Rawya;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5028-5057
17.
A Novel Perceptual Hashing for Color Images Using a Full Quaternion Representation

Xing, Xiaomei;Zhu, Yuesheng;Mo, Zhiwei;Sun, Ziqiang;Liu, Zhen;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5058-5072
18.
Rock Fracture Centerline Extraction based on Hessian Matrix and Steger algorithm

Wang, Weixing;Liang, Yanjie;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5073-5086
19.
Classifier Combination Based Source Identification for Cell Phone Images

Wang, Bo;Tan, Yue;Zhao, Meijuan;Guo, Yanqing;Kong, Xiangwei;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5087-5102
20.
High Resolution ISAR Imaging Based on Improved Smoothed L0 Norm Recovery Algorithm

Feng, Junjie;Zhang, Gong;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5103-5115
21.
Defense Strategy of Network Security based on Dynamic Classification

Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5116-5134
22.
Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment

Lu, Chung-Fu;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5135-5149
23.
Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

Heydari, Vahid;Yoo, Seong-Moo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5150-5169
24.
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting

Wang, Zhi-Hui;Chen, Kuo-Nan;Chang, Chin-Chen;Qin, Chuan;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5170-5188
25.
RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

Yang, Lijun;Ding, Chao;Wu, Meng;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5189-5208
26.
Steganalysis of adaptive JPEG steganography by selecting DCT coefficients according to embedding distortion

Song, Xiaofeng;Liu, Fenlin;Yang, Chunfang;Luo, Xiangyang;Li, Zhenyu;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 12, 2015, pp. 5209-5228