Advanced
Insert title here
If you want submit your manuscript to this journal, click the journal title.
Journal Info
Aims&Scope
Editorial
For Author
Current
Archive
 Archive
Volume 9(2); February 2015
1.
Optimal User Density and Power Allocation for Device-to-Device Communication Underlaying Cellular Networks

Yang, Yang;Liu, Ziyang;Min, Boao;Peng, Tao;Wang, Wenbo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 483-503
2.
PRESSURE BASED ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS: A SURVEY

Khasawneh, Ahmad;Bin Abd Latiff, Muhammad Shafie;Chizari, Hassan;Tariq, MoeenUddin;Bamatraf, Abdullah;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 504-527
3.
Pilot Symbol Assisted Weighted Data Fusion Scheme for Uplink Base-Station Cooperation System

Zhang, Zhe;Yang, Jing;Zhang, Jiankang;Mu, Xiaomin;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 528-544
4.
Outage Analysis and Optimization for Time Switching-based Two-Way Relaying with Energy Harvesting Relay Node

Du, Guanyao;Xiong, Ke;Zhang, Yu;Qiu, Zhengding;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 545-563
5.
Quantum Bacterial Foraging Optimization for Cognitive Radio Spectrum Allocation

Li, Fei;Wu, Jiulong;Ge, Wenxue;Ji, Wei;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 564-582
6.
Group-Sparse Channel Estimation using Bayesian Matching Pursuit for OFDM Systems

Liu, Yi;Mei, Wenbo;Du, Huiqian;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 583-599
7.
A Hybrid Algorithm for Online Location Update using Feature Point Detection for Portable Devices

Kim, Jibum;Kim, Inbin;Kwon, Namgu;Park, Heemin;Chae, Jinseok;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 600-619
8.
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network

Ming, Liang;Zhao, Gang;Wang, Dongxia;Huang, Minhuan;Li, Xiang;Miao, Qing;Xu, Fei;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 620-636
9.
Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks

Song, Myungseok;Cho, Jun-Dong;Jeong, Jong-Pil;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 637-658
10.
An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

Ma, Chuan;Shen, Limin;Wang, Tao;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 659-679
11.
An Efficient Cluster Based Service Discovery Model for Mobile Ad hoc Network

Buvana, M.;Suganthi, M.;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 680-699
12.
Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains

Shen, Hu;Lv, Shaohe;Wang, Xiaodong;Zhou, Xingming;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 700-713
13.
Exact Decoding Probability of Random Linear Network Coding for Tree Networks

Li, Fang;Xie, Min;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 714-727
14.
Improved Disparity Map Computation on Stereoscopic Streaming Video with Multi-core Parallel Implementation

Kim, Cheong Ghil;Choi, Yong Soo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 728-741
15.
Discriminant Metric Learning Approach for Face Verification

Chen, Ju-Chin;Wu, Pei-Hsun;Lien, Jenn-Jier James;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 742-762
16.
A Novel Method for Hand Posture Recognition Based on Depth Information Descriptor

Xu, Wenkai;Lee, Eung-Joo;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 763-774
17.
Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 775-792
18.
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things

Li, Wei;Zhang, Wenwen;Gu, Dawu;Tao, Zhi;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 793-810
19.
A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

Zhu, Hongfeng;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 811-829
20.
Formal Trust Assessment with Confidence Probability

Kutay, Mahir;Ercan, Tuncay;
KSII Transactions on Internet and Information Systems (TIIS), vol. 9, iss. 2, 2015, pp. 830-842