Search dblp for Publications

export results for "toc:db/journals/ijmcmc/ijmcmc6.bht:"

 download as .bib file

@article{DBLP:journals/ijmcmc/AmatoVM14,
  author       = {Alba Amato and
                  Salvatore Venticinque and
                  Beniamino Di Martino},
  title        = {A Distributed and Scalable Solution for Applying Semantic Techniques
                  to Big Data},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {50--67},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014040105},
  doi          = {10.4018/IJMCMC.2014040105},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/AmatoVM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/AwadA14,
  author       = {Wasan Shaker Awad and
                  Hanin Mohammed Abdullah},
  title        = {Improving the Security of Storage Systems: Bahrain Case Study},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {75--105},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014070104},
  doi          = {10.4018/IJMCMC.2014070104},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/AwadA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/BorisenkoKS14,
  author       = {Konstantin Borisenko and
                  Ivan Kholod and
                  Andrey Shorov},
  title        = {Framework for Infrastructure Attack Modeling in Hybrid Networks},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {98--114},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100106},
  doi          = {10.4018/IJMCMC.2014100106},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/BorisenkoKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/ChenN14,
  author       = {Kan Chen and
                  Bala Natarajan},
  title        = {MIMO-Based Secret Key Generation Strategies: Rate Analysis},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {22--55},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014070102},
  doi          = {10.4018/IJMCMC.2014070102},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/ChenN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/Edward14,
  author       = {E. Prince Edward},
  title        = {A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated
                  Networks},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {56--74},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014070103},
  doi          = {10.4018/IJMCMC.2014070103},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/Edward14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/FanWWW14,
  author       = {Jianhua Fan and
                  Qiping Wang and
                  Xianglin Wei and
                  Tongxiang Wang},
  title        = {Jammer Location-Oriented Noise Node Elimination Method for {MHWN}},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {1--19},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100101},
  doi          = {10.4018/IJMCMC.2014100101},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/FanWWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/FrikhO14,
  author       = {Bouchra Frikh and
                  Brahim Ouhbi},
  title        = {Web Algorithms for Information Retrieval: {A} Performance Comparative
                  Study},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {1},
  pages        = {1--16},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014010101},
  doi          = {10.4018/IJMCMC.2014010101},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/FrikhO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/LiuPQH14,
  author       = {Shigang Liu and
                  Yali Peng and
                  Guoyong Qiu and
                  Xuanwen Hao},
  title        = {A Local Statistical Information Active Contour Model for Image Segmentation},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {33--49},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014040104},
  doi          = {10.4018/IJMCMC.2014040104},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/LiuPQH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/LiuZWT14,
  author       = {Yangguang Liu and
                  Yangming Zhou and
                  Shiting Wen and
                  Chaogang Tang},
  title        = {A Strategy on Selecting Performance Metrics for Classifier Evaluation},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {20--35},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100102},
  doi          = {10.4018/IJMCMC.2014100102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/LiuZWT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/MatsukidaMF14,
  author       = {Hirotsugu Matsukida and
                  Yuta Mieno and
                  Hiroyuki Fujioka},
  title        = {Reconstructing Handwriting Character Font Models with Incorrect Stroke
                  Order},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {1--12},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014040101},
  doi          = {10.4018/IJMCMC.2014040101},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/MatsukidaMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/MountassirNHB14,
  author       = {Tarik Mountassir and
                  Bouchaib Nassereddine and
                  Abdelkrim Haqiq and
                  Samir Bennani},
  title        = {Optimal Channel Assignment Algorithm for Least Interfered Wireless
                  Mesh Networks},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {1},
  pages        = {54--67},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014010103},
  doi          = {10.4018/IJMCMC.2014010103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/MountassirNHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/NovakovLLS14,
  author       = {Stevan Novakov and
                  Chung{-}Horng Lung and
                  Ioannis Lambadaris and
                  Nabil Seddigh},
  title        = {A Hybrid Technique Using {PCA} and Wavelets in Network Traffic Anomaly
                  Detection},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {1},
  pages        = {17--53},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014010102},
  doi          = {10.4018/IJMCMC.2014010102},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/NovakovLLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/NovikovaKF14,
  author       = {Evgenia Novikova and
                  Igor V. Kotenko and
                  Evgenii Fedotov},
  title        = {Interactive Multi-View Visualization for Fraud Detection in Mobile
                  Money Transfer Services},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {73--97},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100105},
  doi          = {10.4018/IJMCMC.2014100105},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/NovikovaKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/RehmanAA14,
  author       = {Saeed Ur Rehman and
                  Shafiq Alam and
                  Iman Tabatabaei Ardekani},
  title        = {An Overview of Radio Frequency Fingerprinting for Low-End Devices},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {1--21},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014070101},
  doi          = {10.4018/IJMCMC.2014070101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/RehmanAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/SakamotoLOKBX14,
  author       = {Shinji Sakamoto and
                  Algenti Lala and
                  Tetsuya Oda and
                  Vladi Kolici and
                  Leonard Barolli and
                  Fatos Xhafa},
  title        = {Application of {WMN-SA} Simulation System for Node Placement in Wireless
                  Mesh Networks: {A} Case Study for a Realistic Scenario},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {13--21},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014040102},
  doi          = {10.4018/IJMCMC.2014040102},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/SakamotoLOKBX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/ShengY14,
  author       = {Guorui Sheng and
                  Bo Yang},
  title        = {An Improved Counter-Forensic Algorithm to Erase the {JPEG} Compression
                  Artifacts},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {22--32},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014040103},
  doi          = {10.4018/IJMCMC.2014040103},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/ShengY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/WenLHY14,
  author       = {Jyh{-}Horng Wen and
                  Jheng{-}Sian Li and
                  Hsiang{-}Shan Hou and
                  Cheng{-}Ying Yang},
  title        = {Relay Selection Scheme for Cooperative Communication Systems in Fixed
                  Decode-and-Forward Mode},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {68--77},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijmcmc.2014040106},
  doi          = {10.4018/IJMCMC.2014040106},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/WenLHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/YangHCM14,
  author       = {Qinghong Yang and
                  Xiangquan Hu and
                  Zhichao Cheng and
                  Kang Miao},
  title        = {Machine Learning Based Prediction and Prevention of Malicious Inventory
                  Occupied Orders},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {56--72},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100104},
  doi          = {10.4018/IJMCMC.2014100104},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/YangHCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/ZhangWWWX14,
  author       = {Guomin Zhang and
                  Zhanfeng Wang and
                  Rui Wang and
                  Na Wang and
                  Chang{-}you Xing},
  title        = {What is New about the Internet Delay Space?},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {36--55},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100103},
  doi          = {10.4018/IJMCMC.2014100103},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/ZhangWWWX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics