Digital Library
Vol. 13, No. 5, May 30, 2019
[Regular Papers]
Internet & Communications
- Target localization
- Multipath environment
- Data association
- Expectation maximization
- Distributed implementation
- Average consensus
- Small Cell Networks (SCNs)
- Pre-caching Technology
- Internet Content Providers (ICPs)
- Bankruptcy Game
- Analytic Hierarchy Process (AHP)
- Reliability, expression of reliability, I.E principle
- vehicular ad-hoc networks, headway distance, freeway highway, universal speed factor
- Top-N recommendation
- Collaborative Filtering (CF)
- learning to rank (LTR)
- Mean Average Precision (MAP)
- implicit feedback
- distributed compressive sensing (DCS)
- adaptive matching pursuit
- doubly-selective fading channel
- basis expansion model (BEM)
- channel estimation
- 3D laser radar
- laser triangulation
- distance measurement
- weighted average algorithm
- 3D reconstruction
- Direct position determinations(DPD)
- Nested array
- distributed source
- Compressed sensing
- vectorization
- Low-energy adaptive clustering hierarchy (LEACH) protocol
- bat algorithm
- Curve decline strategy
- Triangle-flipping strategy
- Online communications
- comments and reactions
- media consumers
- willingness to watch
- distinction bias
- behavioral economics
Multimedia
- license plate recognition
- license plate structure classification
- multi-style license plate
- k-nearest neighbor
Internet Security
- homomorphic encryption
- digital speech signal
- secure speech storing
- less data expansion
- Cloud computing
- Fully homomorphic encryption
- Ciphertext Matrix
- Ciphertexts Stack
- Decryption Structure
- Concert Parameters
- password authentication
- targeted password attacking
- BiLSTM
- probabilistic context-free grammar
- Markov chain
- Personal Information
- Image secrecy
- Multi-stage encryption
- Visual cryptography
- One time pad
- Steganography
- Least Significant Bit
- Ciphertext-policy attribute-based encryption
- conjunctive keyword search
- Secure channel
- Keyword-guessing attacks
- Search policy
- Wireless Sensor Network
- artificial immune
- Intrusion Detection
- danger theory
- Genetic Algorithms
- Security
Archives
