default search action
Information Sciences, Volume 321
Volume 321, November 2015
- Wenye Li:
Visualizing network communities with a semi-definite programming method. 1-13 - Enrique Onieva, Unai Hernández-Jayo, Eneko Osaba, Asier Perallos, Xiao Zhang:
A multi-objective evolutionary algorithm for the tuning of fuzzy rule bases for uncoordinated intersections in autonomous driving. 14-30 - Ángel Cuenca, Unnati Ojha, Julián Salt, Mo-Yuen Chow:
A non-uniform multi-rate control strategy for a Markov chain-driven Networked Control System. 31-47 - Mihaela Cocea, George D. Magoulas:
Participatory Learner Modelling Design: A methodology for iterative learner models development. 48-70 - Kefeng Wang, Yi Mu, Willy Susilo:
Identity-based quotable ring signature. 71-89 - Manish Aggarwal:
On learning of weights through preferences. 90-102 - Deqing Li, Wenyi Zeng, Yibin Zhao:
Note on distance measure of hesitant fuzzy sets. 103-115 - Marta Fort, Joan Antoni Sellarès:
Common influence region problems. 116-135 - Rafaela Osuna Gómez, Yurilev Chalco-Cano, Beatriz Hernández-Jiménez, Gabriel Ruiz Garzón:
Optimality conditions for generalized differentiable interval-valued functions. 136-146
- Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:
Security and privacy information technologies and applications for wireless pervasive computing environments. 147-149 - Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
A novel consumer-centric card management architecture and potential security issues. 150-161 - Ding Wang, Nan Wang, Ping Wang, Sihan Qing:
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. 162-178 - Mauro Andreolini, Michele Colajanni, Mirco Marchetti:
A collaborative framework for intrusion detection in mobile networks. 179-192 - Patrick Shicheng Chen, Shu-Chiung Lin, Chien-Hsing Sun:
Simple and effective method for detecting abnormal internet behaviors of mobile devices. 193-204 - Ruben Rios, Jorge Cuéllar, Javier López:
Probabilistic receiver-location privacy protection in wireless sensor networks. 205-223 - Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. 224-237 - Wen-Long William Chin, Trong Nghia Le, Chun-Lin Tseng:
Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels. 238-249 - Jen-Chun Lee, Chien-Ping Chang, Wei-Kuei Chen:
Detection of copy-move image forgery using histogram of orientated gradients. 250-262 - Debiao He, Neeraj Kumar, Naveen K. Chilamkurti:
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. 263-277
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.