Frontiers in Internet Technologies

A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
A Prediction Algorithm for Real-Time Video Traffic Based on Wavelet Packet
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
The Evaluation of Online Social Network's Nodes Influence Based on User's Attribute and Behavior
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
A Bayesian Investment Model for Online P2P Lending
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
On the Spatial-temporal Reachability of DTNs
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
Research on Efficient Non-slotted Tree Structures for Advance Reservation
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
A PSO-Optimized Nash Equilibrium-Based Task Scheduling Algorithm for Wireless Sensor Network
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Efficient Lookup Service in DHT Based Communication System
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
An Improved Cooperative Model of P2P and ISP
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
Assessing Survivability of Inter-domain Routing System under Cascading Failures
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
A Computer Network Defense Policy Refinement Method
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
Research on Resource Management in PaaS Based on IaaS Environment
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
A Conflict-Related Rules Detection Tool for Access Control Policy
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
East-West Bridge for SDN Network Peering
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
A Connectivity Invariant Dynamic Multichannel Assignment Method for VANET
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
TraSt: A Traffic Statistic Framework for Evaluating 3G Charging System and Smart Phone Applications
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Towards Internet Innovation: Software Defined Data Plane
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
Mining Network Behavior Specifications of Malware Based on Binary Analysis
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
CoISM: Improving Security and Accuracy of BGP through Information Sharing
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization
Detecting Community Structures in Social Networks with Particle Swarm Optimization