default search action
Smart Computing Review, Volume 3
Volume 3, Number 1, February 2013
- Bakkiam David Deebak, Rajappa Muthaiah, Karuppusamy Thenmozhi, Pitchai Iyer Swaminathan:
IP Multimedia Subsystem - An Intrusion Detection System. 1-13 - D. Indumathi, A. Chitra, K. Girthana:
Search Query Expansion using Genetic Algorithm-based Clustering. 14-23 - You Fu, Zesong Fei, Niwei Wang, Chengwen Xing, Lei Wan:
An Energy-Efficient Dense PicoStation Deployment and Power Control Strategy for Heterogeneous Networks. 24-32 - Hayoung Oh:
Practical Online Scheduling for Mobile Video Streaming on Smartphones. 33-41 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem. 42-54
Volume 3, Number 2, April 2013
- Tong Liu, Jianbin Xie, Huanzhang Lu, Wei Yan, Peiqin Li:
Finger Vein Representation by Modified Binary Tree Model. 54-61 - Jennifer S. Raj, Rajaguru Harikumar:
A Neighbor-Aware Connectivity Architecture for Mobile Internet Maintenance. 62-73 - A. M. Miyim, Mahamod Ismail, Rosdiadee Nordin:
Fast Networks as a Candidate for LTE-Advanced Networks. 74-85 - Enzhan Zhang, Yujun Kuang, Jerry John Kponyo:
Analysis of Packets Reception Rate for One-Hop Broadcast in 2-D VANETs. 86-102 - Yong Jian Chin, Kian-Ming Lim, Siew Chin Chong, Chin-Poo Lee:
Minimal Redundancy Maximal Relevance Criterion-based Multi-biometric Feature Selection. 103-111 - Ruoyu Wang, Ling Zhang, Zhen Liu:
Classifying imbalanced Internet traffic based PCDD: a per concept drift detection method. 112-122 - Ardiansyah Musa Efendi, Seungkyo Oh, Deokjai Choi:
6LoWPAN-based Wireless Home Automation: From Secure System Development to Building Energy Management. 123-138
Volume 3, Number 3, June 2013
- Xiao Xia, Xiaodong Wang, Xingming Zhou:
Evolving Recommender System for Mobile Apps: A Diversity Measurement Approach. 139-154 - Md. Iqbal Hasan Sarker, Md. Shahed Iqbal:
Content-based Image Retrieval Using Haar Wavelet Transform and Color Moment. 155-165 - Reza Kasyauqi Sabhara, Chin-Poo Lee, Kian-Ming Lim:
Comparative Study of Hu Moments and Zernike Moments in Object Recognition. 166-173 - Xinghua Li, Xiang Lu, Jianfeng Ma:
An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. 174-189 - Hayoung Oh:
Automated Security Management Using Data-Mining Techniques. 190-198 - Zhiqiang Zou, Yue Wang, Kai Cao, Shu Shen, Bin Zhang:
An Efficient Spatial Data Index Based On Gossip for Overlay Networks. 199-209
Volume 3, Number 4, August 2013
- Xiaoxu He, Chenxi Shao, Yan Xiong:
Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering. 210-219 - Mohsin Bilal, Muhammad Shams-ur-Rehman, M. Arfan Jaffar:
Evolutionary Reconstruction: Image Restoration for Space Variant Degradation. 220-232 - Jung-Jae Kim, Min-Woo Ryu, Si-Ho Cha, Kuk-Hyun Cho:
A Cluster-based Path-relocation Routing Protocol for Load-balancing in Content-Centric Networks. 233-245 - Fahim Irfan Alam, Muhammad Iqbal Hasan Chowdhury, Md. Reza Rabbani:
A Prediction Model to Support a MultilayerNetwork-based Universal Electronic CashTransaction Framework. 246-260 - Gulbadan Sikander, Mohammad Haseeb Zafar, Ahmad Raza, Muhammad Inayatullah Babar, Sahibzada Ali Mahmud, Gul Muhammad Khan:
A Survey of Cluster-based Routing Schemes for Wireless Sensor Networks. 261-275 - Keun-Wang Lee:
A QoS Control Method Based on SLA. 276-284 - Dong Ma, Yongjun Wang:
Network Threat Behavior Detection and Trend Analysis Based on the TDLC Model. 285-297
Volume 3, Number 5, October 2013
- Md. Iqbal Hasan Sarker, Mohammad Ibrahim Khan:
An Efficient Image Watermarking Scheme Using BFS Technique Based on Hadamard Transform. 298-308 - Walid A. Hassan, Han-Shin Jo, Tharek Abd Rahman:
Simulation Model for Compatibility between LTE-Advanced and Digital Broadcasting in the Digital Dividend Band. 309-322 - Alok Kumar Chowdhury, Md. Ibrahim Khan:
A Tutorial for Audio Watermarking in the Cepstrum Domain. 323-335 - Wei Yan, Jianbin Xie, Peiqin Li, Tong Liu, Xiaoguang Guo:
An Algorithm for Vein Matching Based on Log-polar Transform. 336-345 - Munish Kumar, Manish Kumar Jindal, Rajendra Kumar Sharma:
PCA-based Offline Handwritten Character Recognition System. 346-357 - Kathiravan Srinivasan, Kanakaraj Jaganathan:
A Review of Magnetic Resonance Imaging Techniques. 358-366 - Kilhun Lee:
Tutorial: WordPress for Secure Virtualization Systems in a CMS Environment. 367-373 - Daewon Jung, Changsoo Lee:
New Introduction: Search Method for Similar Images from Representative Video Frame Images. 374-382 - Hector Bedon, Carlos Miguel, Angel Fernández, Jong Sou Park:
A DTN System for Nanosatellite-based Sensor Networks using a New ALOHA Multiple Access with Gateway Priority. 383-396
Volume 3, Number 6, December 2013
- Munish Kumar, Manish Kumar Jindal, Rajendra Kumar Sharma:
MDP Feature Extraction Technique for Offline Handwritten Gurmukhi Character Recognition. 397-404 - S. A. Hussain, A. Saeed, Safee Ullah Chaudhary:
A Dynamically Controlled Broadcasting Scheme for VANETs in Dense Traffic Environments. 405-415 - Byungwook Jin:
An Introduction: Context-aware Computing for Secure Message Transmission System in M2M. 416-424 - Chunhua Xiao, Zhangqin Huang, Da Li:
A Tutorial for Key Problems in the Design of Hybrid Hierarchical NoC Architectures with Wireless/RF. 425-436 - Danning Feng, Huijun Yue, Xinyue Li, Siyang Tan, Rui Tao, Junbin Lai:
Simulation of Spinal Codes. 437-446 - Jaeseok Yun, Min-Woo Ryu, Sang-Shin Lee:
Visualization of Upper Air Data from Radiosonde Stations using Google Earth API. 447-457 - Abbirah Ahmed, Sameer Qazi:
Lead Me, Follow Me, or Get Out Of My Way: Cluster Head Selection Algorithm for Mobile-WSNs. 458-470 - Sung-Chan Choi, Jaeho Kim, Jaeseok Yun, Il-Yeop Ahn:
A Tutorial for Energy-efficient Communication for XMPP-based Internet of Things. 471-479 - Aziz Mohaisen, Joongheon Kim:
The Sybil Attacks and Defenses: A Survey. 480-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.