default search action
Information, Volume 7
Volume 7, Number 1, March 2016
- Ron Cottam, Willy Ranson, Roger Vounckx:
Hierarchy and the Nature of Information. 1 - Jia Yu, Shinsuke Konaka, Masatake Akutagawa, Qinyu Zhang:
Cross-Entropy-Based Energy-Efficient Radio Resource Management in HetNets with Coordinated Multiple Points. 3 - Bo Tian, Jingti Han, Kecheng Liu:
Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce. 4 - Jie Liu, Jinglei Liu:
The Treewidth of Induced Graphs of Conditional Preference Networks Is Small. 5 - Yong Wang, Wenlong Ke, Xiaoling Tao:
A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark. 6 - Jeng-Fung Chen, Shih-Kuei Lo, Quang Hung Do:
An Approach to the Classification of Cutting Vibration on Machine Tools. 7 - Yuebo Zha, Wei Pu, Gao Chen, Yulin Huang, Jianyu Yang:
A Minimum-Entropy Based Residual Range Cell Migration Correction for Bistatic Forward-Looking SAR. 8 - Zhiyong Zeng:
A Novel Local Structure Descriptor for Color Image Retrieval. 9 - Xin Shu, Qianni Zhang, Jinlong Shi, Yunsong Qi:
A Comparative Study on Weighted Central Moment and Its Application in 2D Shape Retrieval. 10 - Marcin Jan Schroeder:
Invariance as a Tool for Ontology of Information. 11 - Wen Zhang, Chaoqi Bu, Taketoshi Yoshida, Siguang Zhang:
CoSpa: A Co-training Approach for Spam Review Identification with Support Vector Machine. 12 - Yan Sun, Maoxiang Lang, Jiaxi Wang:
On Solving the Fuzzy Customer Information Problem in Multicommodity Multimodal Routing with Schedule-Based Services. 13 - Udesh Oruthota, Furqan Ahmed, Olav Tirkkonen:
Ultra-Reliable Link Adaptation for Downlink MISO Transmission in 5G Cellular Networks. 14 - Shahab Asoodeh, Mario Díaz, Fady Alajaji, Tamás Linder:
Information Extraction Under Privacy Constraints. 15 - Qiuming Liu, Yong Luo, Yun Ling, Jun Zheng:
Throughput Capacity of Selfish Wireless Ad Hoc Networks with General Node Density. 16 - Suman Saha, Satya Prakash Ghrera:
Nearest Neighbor Search in the Metric Space of a Complex Network for Community Detection. 17 - Marko Angjelichinoski, Cedomir Stefanovic, Petar Popovski, Frede Blaabjerg:
Communication-Theoretic Model of Power Talk for a Single-Bus DC Microgrid. 18
Volume 7, Number 2, June 2016
- Andreas Dotzler, Maximilian Riemensberger, Wolfgang Utschick:
Minimax Duality for MIMO Interference Networks. 19 - Xiaoling Tao, Deyan Kong, Yi Wei, Yong Wang:
A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder. 20 - Kaori Fujinami:
On-Body Smartphone Localization with an Accelerometer. 21 - Ming Li, Mengyue Yuan:
An Approach to the Match between Experts and Users in a Fuzzy Linguistic Environment. 22 - Mark R. Heckman, Roger R. Schell:
Using Proven Reference Monitor Patterns for Security Evaluation. 23 - Rafael F. Schaefer, Holger Boche, H. Vincent Poor:
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments. 24 - Anhtuan Le, Jonathan Loo, Kok Keong Chai, Mahdi Aiash:
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology. 25 - Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser:
The Potential of Three Computer-Based Communication Activities for Supporting Older Adult Independent Living. 26 - Hong-Jie Dai, Musa Touray, Jitendra Jonnagaddala, Syed Abdul Shabbir:
Feature Engineering for Recognizing Adverse Drug Reactions from Twitter Posts. 27 - Rene Meis, Maritta Heisel:
Computer-Aided Identification and Validation of Privacy Requirements. 28 - Hongbo Lyu, Zhiying Zhou, Zuopeng Justin Zhang:
Measuring Knowledge Management Performance in Organizations: An Integrative Framework of Balanced Scorecard and Fuzzy Evaluation. 29 - Feng Zhang, Yuetong Xu:
Geospatially Constrained Workflow Modeling and Implementation. 30 - Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng, Guoping Liu:
Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability. 31 - Jerry D. Gibson:
Speech Compression. 32 - Janusz Zalewski, Ingrid A. Buckley, Bogdan D. Czejdo, Steven Drager, Andrew J. Kornecki, Nary Subramanian:
A Framework for Measuring Security as a System Property in Cyberphysical Systems. 33 - Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Implementation Support of Security Design Patterns Using Test Templates . 34 - Abir-Beatrice Karami, Anthony Fleury, Jacques Boonaert, Stéphane Lecoeuche:
User in the Loop: Adaptive Smart Homes Exploiting User Feedback - State of the Art and Future Directions. 35
Volume 7, Number 3, September 2016
- Kristian Beckers, Jürgen Dürrwang, Dominik Holling:
Standard Compliant Hazard and Threat Analysis for the Automotive Domain. 36 - Sheng Xu, Minrui Fei, Haikuan Wang:
Design of Hybrid Wired/Wireless Fieldbus Network for Turbine Power Generation System. 37 - Weijia Lei, Meihui Zhan:
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate. 38 - Zong-Sheng Wu, Wei-Ping Fu, Ru Xue, Wen Wang:
A Novel Global Path Planning Method for Mobile Robots Based on Teaching-Learning-Based Optimization. 39 - Penghao Xu, Bing Yan:
Lateral Cross Localization Algorithm Using Orientation Angle for Improved Target Estimation in Near-Field Environments. 40 - Paul Walton:
Information and Meaning. 41 - Artem Vanin, Sergey V. Aleshin, Rinat Nasirov, Dmitry O. Novikov, Vladimir Tulsky:
Investigation of Voltage Control at Consumers Connection Points Based on Smart Approach. 42 - Shi An, Xinming Zhang:
Real-Time Hybrid In-Station Bus Dispatching Strategy Based on Mixed Integer Programming. 43 - Huichen Lin, Neil W. Bergmann:
IoT Privacy and Security Challenges for Smart Home Environments. 44 - Han Oh, Ali Bilgin, Michael W. Marcellin:
Visually Lossless JPEG 2000 for Remote Image Browsing. 45 - Eduardo B. Fernández:
Introduction to the Special Issue on Evaluating the Security of Complex Systems. 46 - Priyanka Madhushri, Armen Dzhagaryan, Emil Jovanov, Aleksandar Milenkovic:
An mHealth Tool Suite for Mobility Assessment. 47 - Jonathan F. Ross:
The Information Content of Accounting Reports: An Information Theory Perspective. 48 - Tommaso Pecorella, Luca Brilli, Lorenzo Mucchi:
The Role of Physical Layer Security in IoT: A Novel Perspective. 49 - Jacques Demongeot, Adrien Elena, Mariem Jelassi, Slimane Ben Miled, Narjès Bellamine Ben Saoud, Carla Taramasco:
Smart Homes and Sensors for Surveillance and Preventive Education at Home: Example of Obesity. 50 - Tiezhu Li, Lijuan Sun, Chong Han, Jian Guo:
Packet-Forwarding Algorithm in DTN Based on the Pheromone of Destination Node. 51 - Ping Wan, Chaozhong Wu, Yingzi Lin, Xiaofeng Ma:
Optimal Threshold Determination for Discriminating Driving Anger Intensity Based on EEG Wavelet Features and ROC Curve Analysis. 52 - Yucong Chen, Yun Zhou, Jiangtao Wen:
Efficient Software HEVC to AVS2 Transcoding. 53
Volume 7, Number 4, December 2016
- Theeratorn Lersilp:
Access to Information for Learning by Using Assistive Technology for Undergraduate Students with Disabilities in Northern Thailand. 54 - Taewoo Nam:
Government-Driven Participation and Collective Intelligence: A Case of the Government 3.0 Initiative in Korea. 55 - Seyed Morteza Hosseini, Diogo Pratas, Armando J. Pinho:
A Survey on Data Compression Methods for Biological Sequences. 56 - Andreia Brandão, Eliana Pereira, Marisa Esteves, Filipe Portela, Manuel Filipe Santos, António Abelha, José Machado:
A Benchmarking Analysis of Open-Source Business Intelligence Tools in Healthcare Environments. 57 - Uta Russmann, Jakob Svensson:
Studying Organizations on Instagram. 58 - Pavel Lozhnikov, Alexey Sulavko, Alexander Eremenko, Danil Volkov:
Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures. 59 - Fabio Ciabini, Simone Morosi, Lorenzo Mucchi, Luca Simone Ronga:
A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks. 60 - Min Peng, Chongyang Wang, Tong Chen, Guangyuan Liu:
NIRFaceNet: A Convolutional Neural Network for Near-Infrared Face Identification. 61 - Koichiro Matsuno:
Retrocausality in Quantum Phenomena and Chemical Evolution. 62 - Koichi Marumo, Shinichi Yamagiwa, Ryuta Morita, Hiroshi Sakamoto:
Lazy Management for Frequency Table on Hardware-Based Stream Lossless Data Compression. 63 - Jianwei Gao, Huihui Liu:
A New Prospect Projection Multi-Criteria Decision-Making Method for Interval-Valued Intuitionistic Fuzzy Numbers. 64 - Maria Sokhn, Florian Evéquoz, Arnaud Zufferey:
Reaching Citizens' Engagement by Services: Swiss Use Case. 65 - Sae Okura, Muneo Kaigo:
Who Leads Advocacy through Social Media in Japan? Evidence from the "Tsukuba Civic Activities Cyber-Square" Facebook Page. 66 - Linlin Wu, Biao Yang, Peng Jing:
Travel Mode Detection Based on GPS Raw Data Collected by Smartphones: A Systematic Review of the Existing Methodologies. 67 - Samy Bakheet, Ayoub Al-Hamadi:
A Discriminative Framework for Action Recognition Using f-HOL Features. 68 - Muhammad Yusuf, Carl Adams, Kate Dingley:
Digital Citizen Participation within Schools in the United Kingdom and Indonesia: An Actor-Network Theory (ANT) Perspective. 69 - Guobing Qian, Zongli Ruan, Jianqi Lu:
Joint Modulation Classification and User Number Detection for Multiuser MIMO-STBC Systems. 70 - Qingfeng Jiang, Chaoguang Men, Zeyu Tian:
A Credit-Based Congestion-Aware Incentive Scheme for DTNs. 71 - Rong Yang, Baowei Wang:
PACP: A Position-Independent Activity Recognition Method Using Smartphone Sensors. 72 - Arturo Tozzi, James F. Peters:
Symmetries, Information and Monster Groups before and after the Big Bang. 73
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.