• Performance Analysis of Storm in a Real-World Big Data Stream Computing Environment

  • A Human-Machine Collaborative Detection Model for Identifying Web Attacks

  • Constrained Route Planning Based on the Regular Expression

  • AXE: Objects Search in Mobile Volunteered Service

  • A Reinforcement Learning Based Workflow Application Scheduling Approach in Dynamic Cloud Environment

  • Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones

  • p-Faster R-CNN Algorithm for Food Detection

  • Route-Oriented Participants Recruitment in Collaborative Crowdsensing

  • A Comparative Analysis of Content Delivery Capability for Collaborative Dual-Architecture Network

  • A Short Review of Constructing Noise Map Using Crowdsensing Technology

  • Management Node Selection Based on Cloud Model in a Distributed Network

  • Minimum Cost Load Migration in Distributed Software Defined Networks

  • CNTE: A Node Centrality-Based Network Trust Evaluation Method

  • Research of Positioning Tracking on Dynamic Target Based on the Integral Complementing Algorithm

  • LWTP: An Improved Automatic Image Annotation Method Based on Image Segmentation

  • Position vs. Attitude: How Topological Factors Influence Our Difference in the Attitudes on Online Interrelationships? A Case Study with Language Use

  • Collaborative and Green Resource Allocation in 5G HetNet with Renewable Energy

  • High Performance Regular Expression Matching on FPGA

  • An Efficient and Privacy Preserving CP-ABE Scheme for Internet-Based Collaboration

  • A Privacy Settings Prediction Model for Textual Posts on Social Networks

  • On Cost Efficient Dataflow Computing Program Deployment in SDN Managed Distributed Computing Environment

  • A Topology-Aware Reliable Broadcast Scheme for Multidimensional VANET Scenarios

  • Android App Classification and Permission Usage Risk Assessment

  • Adaptive Carving Method for Live FLV Streaming

  • Formal Verification of Authorization Policies for Enterprise Social Networks Using

  • An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs

  • An Electricity Power Collection Data Oriented Missing Data Imputation Solution

  • A Point of Interest Recommendation Approach by Fusing Geographical and Reputation Influence on Location Based Social Networks

  • RETaIL: A Machine Learning-Based Item-Level Localization System in Retail Environment

  • Sensor Data Classification for the Indication of Lameness in Sheep

  • CORB-SLAM: A Collaborative Visual SLAM System for Multiple Robots

  • Integrating User Embedding and Collaborative Filtering for Social Recommendations

  • Collaborative Shilling Detection Bridging Factorization and User Embedding

  • Easing Traffic Congestion: An Improved Clustering Method for Sharing Bike Station Deployment

  • MAC-ILoc: Multiple Antennas Cooperation Based Indoor Localization Using Cylindrical Antenna Arrays

  • Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment

  • T-SCMA: Time Domain Sparse Code Multiple Access for Narrow Band Internet of Things (NB-IoT) (Invited Paper)

  • Sound-Wave Transmission System in Mobile Device

  • UE-Group Based Multi-beams Subchannel Assignment for mmWave Cellular Networks (Invited Paper)

  • Intelligent Trashcan Applications Relying on Internet of Things Technologies

  • A Local Customizable Gateway in General-Purpose IoT Framework

  • A Flow Network Based Backhaul Path Planning Algorithm for mmWave Small Cell Networks (Invited Paper)

  • SVC Based Multiple Access Protocol with QoS Guarantee for Next Generation WLAN (Invited Paper)

  • Spatial Clustering Group Based OFDMA Multiple Access Scheme for the Next Generation WLAN (Invited Paper)

  • Semi-granted Sparse Code Multiple Access (SCMA) for 5G Networks (Invited Paper)

  • Light-Weight Global Feature for Mobile Clothing Search

  • Research on the Condition Monitoring of Transmission and Transformation Equipment Based on Improved Support Vector Machine in the Internet of Things

  • A Dynamic Detection Point Frame Length Adjustment Method for RFID Anti-collision

  • D2D-Based Resource Saving and Throughput Enhancement for Massive Smart Devices in LTE eMBMS

  • Analysis of Maximum Depth of Wireless Sensor Network Based on RPL and IEEE 802.15.4