We use cookies to improve your experience with our site.

Preface
Wenwu Zhu, Yonggang Wen, Zhi Wang
2015, 30(6): 1161-1162. DOI: 10.1007/s11390-015-1590-6
Abstract
Towards Cost-Effective Cloud Downloading with Tencent Big Data
Zhen-Hua Li, Gang Liu, Zhi-Yuan Ji, Roger Zimmermann
2015, 30(6): 1163-1174. DOI: 10.1007/s11390-015-1591-5
Abstract
Quantifying the Influence of Websites Based on Online Collective Attention Flow
Yong Li, Jiang Zhang, Xiao-Feng Meng, Chang-Qing Wang
2015, 30(6): 1175-1187. DOI: 10.1007/s11390-015-1592-4
Abstract
From Interest to Location: Neighbor-Based Friend Recommendation in Social Media
Jin-Qi Zhu, Li Lu, Chun-Mei Ma
2015, 30(6): 1188-1200. DOI: 10.1007/s11390-015-1593-3
Abstract
Enhancing Telco Service Quality with Big Data Enabled Churn Analysis: Infrastructure, Model, and Deployment
Hui Li, Di Wu, Gao-Xiang Li, Yi-Hao Ke, Wen-Jie Liu, Yuan-Huan Zheng, Xiao-La Lin
2015, 30(6): 1201-1214. DOI: 10.1007/s11390-015-1594-2
Abstract
SEIP: System for Efficient Image Processing on Distributed Platform
Tao Liu, Yi Liu, Qin Li, Xiang-Rong Wang, Fei Gao, Yan-Chao Zhu, De-Pei Qian
2015, 30(6): 1215-1232. DOI: 10.1007/s11390-015-1595-1
Abstract
An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets
Xi-Te Wang, De-Rong Shen, Mei Bai, Tie-Zheng Nie, Yue Kou, Ge Yu
2015, 30(6): 1233-1248. DOI: 10.1007/s11390-015-1596-0
Abstract
Infrastructure-Free Floor Localization Through Crowdsourcing
Hai-Bo Ye, Tao Gu, Xian-Ping Tao, Jian Lv
2015, 30(6): 1249-1273. DOI: 10.1007/s11390-015-1597-z
Abstract
A Family of Stable Multipath Dual Congestion Control Algorithms
Ying Liu, Hong-Ying Liu, Ke Xu, Meng Shen
2015, 30(6): 1274-1289. DOI: 10.1007/s11390-015-1598-y
Abstract
Throughput Optimization in Cognitive Radio Networks Ensembling Physical Layer Measurement
Yan-Chao Zhao, Jie Wu, Wen-Zhong Li, Sang-Lu Lu
2015, 30(6): 1290-1305. DOI: 10.1007/s11390-015-1599-x
Abstract
Cognitive Power Management in Wireless Sensor Networks
Seyed Mehdi Tabatabaei, Vesal Hakami, Mehdi Dehghan
2015, 30(6): 1306-1317. DOI: 10.1007/s11390-015-1600-8
Abstract
Privacy Petri Net and Privacy Leak Software
Le-Jun Fan, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, Chuang Lin
2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7
Abstract
Understanding Sybil Groups in the Wild
Jing Jiang, Zi-Fei Shan, Xiao Wang, Li Zhang, Ya-Fei Dai
2015, 30(6): 1344-1357. DOI: 10.1007/s11390-015-1602-6
Abstract
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON
Xiao-Li Yu, Wen-Ling Wu, Zhen-Qing Shi, Jian Zhang, Lei Zhang, Yan-Feng Wang
2015, 30(6): 1358-1369. DOI: 10.1007/s11390-015-1603-5
Abstract
Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle
Cheng-Liang Tian, Wei Wei, Dong-Dai Lin
2015, 30(6): 1370-1377. DOI: 10.1007/s11390-015-1604-4
Abstract