Digital Library
Vol. 9, No. 10, October 30, 2015
[Regular Papers]
Internet & Communications
10.3837/tiis.2015.10.001
10.3837/tiis.2015.10.002
10.3837/tiis.2015.10.003
10.3837/tiis.2015.10.004
10.3837/tiis.2015.10.005
10.3837/tiis.2015.10.006
- opportunistic spectrum access
- multi-agent learning
- distributed channel selection
- potential game
- and discrete feedback
10.3837/tiis.2015.10.007
10.3837/tiis.2015.10.008
10.3837/tiis.2015.10.009
10.3837/tiis.2015.10.010
10.3837/tiis.2015.10.011
10.3837/tiis.2015.10.012
- M2M communications
- N-Nakagami fading channels
- incremental relaying
- decode-and-forward
- average bit error probability
10.3837/tiis.2015.10.013
10.3837/tiis.2015.10.014
- mobile converged network
- multihoming
- layer 2
- UMTS
- WiMAX
- Vertical handover
- inter-RAT handover
- soft handover
10.3837/tiis.2015.10.015
- Cognitive Radio Networks
- channel bonding
- channel reservation
- imperfect channel sensing
- three-dimensional Markov chain
- charging policy
10.3837/tiis.2015.10.016
Multimedia
10.3837/tiis.2015.10.017
- Text detection
- non-text identification
- page segmentation
- document layout analysis
- OCR
- recursive filter
10.3837/tiis.2015.10.018
10.3837/tiis.2015.10.019
- Depth Image
- scalable coding
- inter-layer prediction
- depth difference synthesis-guided edge detection
- partial differential equation
10.3837/tiis.2015.10.020
- Finger Vein Recognition
- Multi-Orientation Weighted Symmetric Local Graph Structure
- Symmetric Local Graph Structure
- Local Graph Structure
10.3837/tiis.2015.10.021
10.3837/tiis.2015.10.022
Internet Security
10.3837/tiis.2015.10.023
- Internet of Things
- cognitive radio
- Power Resource Allocation
- Blotto Game
- Learning-based game model
- Iterative Nash Bargaining
10.3837/tiis.2015.10.024
- android security
- WebView
- Embedded browser
- Smart Phone Security
- Malicious Attacks
- Java Script Injection
10.3837/tiis.2015.10.025
10.3837/tiis.2015.10.026
10.3837/tiis.2015.10.027
- vehicular ad hoc networks (VANETs)
- group signature
- Chinese Remainder Theorem
- Schnorr signature algorithm
- blind certificates
Archives