Table of Contents Author Guidelines Submit a Manuscript

Citations to this Journal [1,522 citations: 1–100 of 953 articles]

Articles published in Mobile Information Systems have been cited 1,522 times. The following is a list of the 953 articles that have cited the articles published in Mobile Information Systems.

  • Chao Wang, Qingzhen Xu, Xiuli Lin, and Shouqiang Liu, “Research on data mining of permissions mode for Android malware detection,” Cluster Computing, 2018. View at Publisher · View at Google Scholar
  • M. S. Gowtham, and Kamalraj Subramaniam, “Congestion control and packet recovery for cross layer approach in MANET,” Cluster Computing, 2018. View at Publisher · View at Google Scholar
  • Xin Liu, Yanju Zhou, and Xiaohong Chen, “Mining Outlier Data in Mobile Internet-Based Large Real-Time Databases,” Complexity, vol. 2018, pp. 1–12, 2018. View at Publisher · View at Google Scholar
  • Yaser Baseri, Abdelhakim Hafid, and Soumaya Cherkaoui, “Privacy preserving fine-grained location-based access control for mobile cloud,” Computers & Security, vol. 73, pp. 249–265, 2018. View at Publisher · View at Google Scholar
  • Germán Mendoza-Silva, Philipp Richter, Joaquín Torres-Sospedra, Elena Lohan, and Joaquín Huerta, “Long-Term WiFi Fingerprinting Dataset for Research on Robust Indoor Positioning,” Data, vol. 3, no. 1, pp. 3, 2018. View at Publisher · View at Google Scholar
  • Dongming Feng, and Maria Q. Feng, “Computer vision for SHM of civil infrastructure: From dynamic response measurement to damage detection – A review,” Engineering Structures, vol. 156, pp. 105–117, 2018. View at Publisher · View at Google Scholar
  • Minrui Wu, Yanhui Wu, Xiao Liu, Ming Ma, Anfeng Liu, and Ming Zhao, “Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things,” EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, 2018. View at Publisher · View at Google Scholar
  • Jinlong Hu, Junjie Liang, Yuezhen Kuang, and Vasant Honavar, “A User Similarity-based Top- N Recommendation Approach for Mobile In-application Advertising,” Expert Systems with Applications, 2018. View at Publisher · View at Google Scholar
  • Iosif Viktoratos, Athanasios Tsadiras, and Nick Bassiliades, “Combining Community-Based Knowledge with Association Rule Mining to Alleviate the Cold Start Problem in Context-Aware Recommender Systems,” Expert Systems with Applications, 2018. View at Publisher · View at Google Scholar
  • Francisco Rodriguez-Montúfar, Bayron Ordoñez-Buitron, Diego Duran, Angela Chantre-Astaiza, and Gustavo Ramirez-Gonzalez, “A structured process to create datasets with nutritional information,” F1000Research, vol. 7, pp. 110, 2018. View at Publisher · View at Google Scholar
  • Pedro Palos-Sanchez, and Jose Saura, “The Effect of Internet Searches on Afforestation: The Case of a Green Search Engine,” Forests, vol. 9, no. 2, pp. 51, 2018. View at Publisher · View at Google Scholar
  • Ray-Guang Cheng, Zdenek Becvar, and Ping-Hsun Yang, “Modeling of Distributed Queueing-Based Random Access for Machine Type Communications in Mobile Networks,” IEEE Communications Letters, vol. 22, no. 1, pp. 129–132, 2018. View at Publisher · View at Google Scholar
  • Xuxun Liu, and Peiyu Zhang, “Data Drainage: A Novel Load Balancing Strategy for Wireless Sensor Networks,” IEEE Communications Letters, vol. 22, no. 1, pp. 125–128, 2018. View at Publisher · View at Google Scholar
  • Tie Qiu, Xize Liu, Keqiu Li, Qing Hu, Arun Kumar Sangaiah, and Ning Chen, “Community-Aware Data Propagation with Small World Feature for Internet of Vehicles,” IEEE Communications Magazine, vol. 56, no. 1, pp. 86–91, 2018. View at Publisher · View at Google Scholar
  • Alessio Martinelli, Han Gao, Paul D. Groves, and Simone Morosi, “Probabilistic Context-Aware Step Length Estimation for Pedestrian Dead Reckoning,” IEEE Sensors Journal, vol. 18, no. 4, pp. 1600–1611, 2018. View at Publisher · View at Google Scholar
  • Huma Ghafoor, and Insoo Koo, “CR-SDVN: A Cognitive Routing Protocol for Software-Defined Vehicular Networks,” IEEE Sensors Journal, vol. 18, no. 4, pp. 1761–1772, 2018. View at Publisher · View at Google Scholar
  • Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, and Roy A. Maxion, “Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 48–62, 2018. View at Publisher · View at Google Scholar
  • Wei Liu, Hong-Bo Shi, Zhe Zhang, Sang-Bing Tsai, Yuming Zhai, Quan Chen, and Jiangtao Wang, “The Development Evaluation of Economic Zones in China,” International Journal of Environmental Research and Public Health, vol. 15, no. 1, pp. 56, 2018. View at Publisher · View at Google Scholar
  • Chien-Hao Kao, Chia-Chun Chen, Wei-Yi Jhu, Yu-Tza Tsai, Shinn-Horng Chen, Chao-Ming Hsu, and Cheng-Yi Chen, “Novel digital glove design for virtual reality applications,” Microsystem Technologies, 2018. View at Publisher · View at Google Scholar
  • Luca Casati, and Andrea Visconti, “The Dangers of Rooting: Data Leakage Detection in Android Applications,” Mobile Information Systems, vol. 2018, pp. 1–9, 2018. View at Publisher · View at Google Scholar
  • Malik Qasaimeh, Raad S. Al-Qassas, and Sara Tedmori, “Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security,” Multimedia Tools and Applications, 2018. View at Publisher · View at Google Scholar
  • Sang-Bing Tsai, “Using the DEMATEL model to explore the job satisfaction of research and development professionals in china's photovoltaic cell industry,” Renewable and Sustainable Energy Reviews, vol. 81, pp. 62–68, 2018. View at Publisher · View at Google Scholar
  • Lixia Zhang, and Jianliang Gao, “Incremental Graph Pattern Matching Algorithm for Big Graph Data,” Scientific Programming, vol. 2018, pp. 1–8, 2018. View at Publisher · View at Google Scholar
  • Jiawei Tang, Anfeng Liu, Ming Zhao, and Tian Wang, “An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks,” Security and Communication Networks, vol. 2018, pp. 1–30, 2018. View at Publisher · View at Google Scholar
  • Miao Yu, Yongzheng Zhang, Tianning Zang, Yipeng Wang, and Yijing Wang, “Information Propagation Prediction Based on Key Users Authentication in Microblogging,” Security and Communication Networks, vol. 2018, pp. 1–7, 2018. View at Publisher · View at Google Scholar
  • Ji-Young Jung, Dong-Yoon Seo, and Jung-Ryun Lee, “Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks,” Sensors, vol. 18, no. 1, pp. 120, 2018. View at Publisher · View at Google Scholar
  • Cristhian Iza-Paredes, Ahmad Mezher, Mónica Aguilar Igartua, and Jordi Forné, “Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs,” Sensors, vol. 18, no. 1, pp. 294, 2018. View at Publisher · View at Google Scholar
  • Jose Celaya-Padilla, Carlos Galván-Tejada, F. López-Monteagudo, O. Alonso-González, Arturo Moreno-Báez, Antonio Martínez-Torteya, Jorge Galván-Tejada, Jose Arceo-Olague, Huizilopoztli Luna-García, and Hamurabi Gamboa-Rosales, “Speed Bump Detection Using Accelerometric Features: A Genetic Algorithm Approach,” Sensors, vol. 18, no. 2, pp. 443, 2018. View at Publisher · View at Google Scholar
  • Joaquín Torres-Sospedra, Antonio Jiménez, Adriano Moreira, Tomás Lungenstrass, Wei-Chung Lu, Stefan Knauth, Germán Mendoza-Silva, Fernando Seco, Antoni Pérez-Navarro, Maria Nicolau, António Costa, Filipe Meneses, Joaquín Farina, Juan Morales, Wen-Chen Lu, Ho-Ti Cheng, Shi-Shen Yang, Shih-Hau Fang, Ying-Ren Chien, and Yu Tsao, “Off-Line Evaluation of Mobile-Centric Indoor Positioning Systems: The Experiences from the 2017 IPIN Competition,” Sensors, vol. 18, no. 2, pp. 487, 2018. View at Publisher · View at Google Scholar
  • Michele Chincoli, and Antonio Liotta, “Self-Learning Power Control in Wireless Sensor Networks,” Sensors, vol. 18, no. 2, pp. 375, 2018. View at Publisher · View at Google Scholar
  • Abdullah Mohammed Baabdullah, “Consumer adoption of Mobile Social Network Games (M-SNGs) in Saudi Arabia: The role of social influence, hedonic motivation and trust,” Technology in Society, 2018. View at Publisher · View at Google Scholar
  • Muhammad Shafiq, Xiangzhan Yu, Ali Kashif Bashir, Hassan Nazeer Chaudhry, and Dawei Wang, “A machine learning approach for feature selection traffic classification using security analysis,” The Journal of Supercomputing, 2018. View at Publisher · View at Google Scholar
  • Mujahid Muhammad, and Ghazanfar Ali Safdar, “Survey on existing authentication issues for Cellular-assisted V2X Communication,” Vehicular Communications, 2018. View at Publisher · View at Google Scholar
  • Qilin Wu, Xianzhong Zhou, Qian Cao, and Huan Fang, “Multihop Capability Analysis in Wireless Information and Power Transfer Multirelay Cooperative Networks,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–12, 2018. View at Publisher · View at Google Scholar
  • Long Zhang, Wanxia Qu, Yinjia Huo, Yang Guo, and Sikun Li, “An SAT-Based Method to Multithreaded Program Verification for Mobile Crowdsourcing Networks,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–8, 2018. View at Publisher · View at Google Scholar
  • Debasis Das, “Positive and Negative Link Prediction Algorithm Based on Sentiment Analysis in Large Social Networks,” Wireless Personal Communications, 2018. View at Publisher · View at Google Scholar
  • Chi Xu, Wei Liang, and Haibin Yu, “Green-energy-powered cognitive radio networks: Joint time and power allocation,” ACM Transactions on Embedded Computing Systems, vol. 17, no. 1, 2017. View at Publisher · View at Google Scholar
  • Zixuan Zheng, Jian Guo, and Eberhard Gill, “Swarm Satellite Mission Scheduling & Planning using Hybrid Dynamic Mutation Genetic Algorithm,” Acta Astronautica, 2017. View at Publisher · View at Google Scholar
  • Guoliang Li, Yingwu Chen, and Lining Xing, “A hybrid online scheduling mechanism with revision and progressive techniques for autonomous Earth observation satellite,” Acta Astronautica, vol. 140, pp. 308–321, 2017. View at Publisher · View at Google Scholar
  • Navneet Kaur, and Sukhwinder Singh, “Optimized Cost Effective and Energy Efficient Routing Protocol for Wireless Body Area Networks,” Ad Hoc Networks, 2017. View at Publisher · View at Google Scholar
  • Karim Karamat Jahromi, Matteo Zignani, Sabrina Gaito, and Gian Paolo Rossi, “Predicting encounter and colocation events,” Ad Hoc Networks, 2017. View at Publisher · View at Google Scholar
  • Muhammad Omer Farooq, Cormac J. Sreenan, Kenneth N. Brown, and Thomas Kunz, “Design and Analysis of RPL Objective Functions for Multi-Gateway Ad-Hoc Low-Power and Lossy Networks,” Ad Hoc Networks, 2017. View at Publisher · View at Google Scholar
  • H. Baek, J. Lee, J. Lee, P. Kim, and B. B. Kang, “Real-Time Scheduling for Preventing Information Leakage with Preemption Overheads,” Advances in Electrical and Computer Engineering, vol. 17, no. 2, pp. 123–132, 2017. View at Publisher · View at Google Scholar
  • Yunchuan Sun, Lei Wu, Shizhong Wu, Shoupeng Li, Tao Zhang, Li Zhang, Junfeng Xu, Yongping Xiong, and Xuegang Cui, “Attacks and countermeasures in the internet of vehicles,” Annales des Telecommunications/Annals of Telecommunications, vol. 72, no. 5-6, pp. 283–295, 2017. View at Publisher · View at Google Scholar
  • Khalid Haruna, Maizatul Akmar Ismail, Suhendroyono Suhendroyono, Damiasih Damiasih, Adi Pierewan, Haruna Chiroma, and Tutut Herawan, “Context-Aware Recommender System: A Review of Recent Developmental Process and Future Research Direction,” Applied Sciences, vol. 7, no. 12, pp. 1211, 2017. View at Publisher · View at Google Scholar
  • David Valiente, Arturo Gil, Luis Payá, Jose Sebastián, and Óscar Reinoso, “Robust Visual Localization with Dynamic Uncertainty Management in Omnidirectional SLAM,” Applied Sciences, vol. 7, no. 12, pp. 1294, 2017. View at Publisher · View at Google Scholar
  • Hicham Amraoui, Ahmed Habbani, and Abdelmajid Hajami, “A Forwarding Game Approach for Reducing Topology Control Traffic in MANETs,” Arabian Journal for Science and Engineering, 2017. View at Publisher · View at Google Scholar
  • Yi Hou, Hong Zhang, and Shilin Zhou, “BoCNF: efficient image matching with Bag of ConvNet features for scalable and robust visual place recognition,” Autonomous Robots, 2017. View at Publisher · View at Google Scholar
  • Hye-Young Kim, and Jong-Min Kim, “A load balancing scheme based on deep-learning in IoT,” Cluster Computing, vol. 20, no. 1, pp. 873–878, 2017. View at Publisher · View at Google Scholar
  • Qingzhen Xu, and Miao Li, “A new cluster computing technique for social media data analysis,” Cluster Computing, 2017. View at Publisher · View at Google Scholar
  • Rui Chang, Liehui Jiang, Wenzhi Chen, Yang Xiang, Yuxia Cheng, and Abdulhameed Alelaiwi, “MIPE: a practical memory integrity protection method in a trusted execution environment,” Cluster Computing, 2017. View at Publisher · View at Google Scholar
  • Pavel V. Kuptsov, and Anna V. Kuptsova, “Radial and circular synchronization clusters in extended starlike network of van der Pol oscillators,” Communications in Nonlinear Science and Numerical Simulation, 2017. View at Publisher · View at Google Scholar
  • Nan Jia, Xiaohui Chen, Liang Yu, Ruomei Wang, Kaixing Yang, and Xiaonan Luo, “An Exercise Health Simulation Method Based on Integrated Human Thermophysiological Model,” Computational and Mathematical Methods in Medicine, vol. 2017, pp. 1–15, 2017. View at Publisher · View at Google Scholar
  • Higinio Mora, José Francisco Colom, David Gil, and Antonio Jimeno Morenilla, “Distributed computational model for shared processing on Cyber-Physical System environments,” Computer Communications, 2017. View at Publisher · View at Google Scholar
  • Chen Chen, Xiaomin Liu, Tie Qiu, Lei Liu, and Arun Kumar Sangaiah, “Latency Estimation Based on Traffic Density for Video Streaming in the Internet of Vehicles,” Computer Communications, 2017. View at Publisher · View at Google Scholar
  • Rosario G. Garroppo, and Saverio Niccolini, “Anomaly detection mechanisms to find social events using cellular traffic data,” Computer Communications, 2017. View at Publisher · View at Google Scholar
  • Meng-Shu Chiang, Chung-Ming Huang, Duy-Tuan Dao, and Binh-Chau Pham, “Gb-PMIPv6: A Group-Based Handover Control Scheme for PMIPv6 Using the 'Hitch on' Concept,” Computer Journal, vol. 60, no. 6, pp. 822–834, 2017. View at Publisher · View at Google Scholar
  • Muhammad Mohsin Mehdi, Imran Raza, and Syed Asad Hussain, “A Game Theory Based Trust Model for Vehicular Ad hoc Networks (VANETs),” Computer Networks, 2017. View at Publisher · View at Google Scholar
  • Qing Liu, and Anfeng Liu, “On the hybrid using of unicast-broadcast in wireless sensor networks,” Computers & Electrical Engineering, 2017. View at Publisher · View at Google Scholar
  • José Francisco Colom, Higinio Mora, David Gil, and María Teresa Signes-Pont, “Collaborative building of behavioural models based on internet of things,” Computers and Electrical Engineering, vol. 58, pp. 385–396, 2017. View at Publisher · View at Google Scholar
  • Upasna Bhandari, Tillmann Neben, Klarissa Chang, and Wen Yong Chua, “Effects of Interface Design Factors on Affective Responses and Quality Evaluations in Mobile Applications,” Computers in Human Behavior, 2017. View at Publisher · View at Google Scholar
  • Jincheng Huang, Jia Zhou, Guangji Liao, Fan Mo, and Huilin Wang, “Investigation of Chinese Students’ O2O Shopping through Multiple Devices,” Computers in Human Behavior, 2017. View at Publisher · View at Google Scholar
  • Yan-dong Wang, Xiao-kang Fu, Wei Jiang, Teng Wang, Ming-Hsiang Tsou, and Xin-yue Ye, “Inferring urban air quality based on social media,” Computers, Environment and Urban Systems, vol. 66, pp. 110–116, 2017. View at Publisher · View at Google Scholar
  • Mario Munoz-Organero, Ramona Ruiz-Blaquez, and Luis Sánchez-Fernández, “Automatic detection of traffic lights, street crossings and urban roundabouts combining outlier detection and deep learning classification techniques based on GPS traces while driving,” Computers, Environment and Urban Systems, 2017. View at Publisher · View at Google Scholar
  • Geert Tasseron, and Karel Martens, “Urban parking space reservation through bottom-up information provision: An agent-based analysis,” Computers, Environment and Urban Systems, vol. 64, pp. 30–41, 2017. View at Publisher · View at Google Scholar
  • Bahman Ravaei, Masoud Sabaei, Hossein Pedram, and Shahrokh Valaee, “Targeted content dissemination in mobile social networks taking account of resource limitation,” Concurrency and Computation: Practice and Experience, pp. e4207, 2017. View at Publisher · View at Google Scholar
  • Yan Kong, Minjie Zhang, Dayong Ye, Jinxiu Zhu, and Junho Choi, “An intelligent agent-based method for task allocation in competitive cloud environments,” Concurrency and Computation: Practice and Experience, pp. e4178, 2017. View at Publisher · View at Google Scholar
  • Elena Lohan, Joaquín Torres-Sospedra, Helena Leppäkoski, Philipp  Richter, Zhe Peng, and Joaquín Huerta, “Wi-Fi Crowdsourced Fingerprinting Dataset for Indoor Positioning,” Data, vol. 2, no. 4, pp. 32, 2017. View at Publisher · View at Google Scholar
  • Yaroslav Obikhod, Yuliia Sverhunova, Georgiy Kachurovskiy, Volodymyr Malyuga, Volodymyr Lysechko, Oleksandr Zhuchenko, Oleksiy Progonniy, Viacheslav Tretijk, and Valeriy Voinov, “Improvement of control method over the environment of cognitive radio system using a neural network,” EasternEuropean Journal of Enterprise Technologies, vol. 4, no. 9-88, pp. 22–28, 2017. View at Publisher · View at Google Scholar
  • Sharma, Kumar, and Kaur, “UAV-assisted content-based sensor search in IoTs,” Electronics Letters, vol. 53, no. 11, pp. 724–726, 2017. View at Publisher · View at Google Scholar
  • Lei Yang, and Jianpei Zhang, “Automatic transfer learning for short text mining,” Eurasip Journal on Wireless Communications and Networking, vol. 2017, no. 1, 2017. View at Publisher · View at Google Scholar
  • Noelia Hernández, Jose M. Alonso, and Manuel Ocaña, “Fuzzy classifier ensembles for hierarchical WiFi-based semantic indoor localization,” Expert Systems with Applications, 2017. View at Publisher · View at Google Scholar
  • Heejung Yu, Illa Ul Rasool, Yousaf Bin Zikria, and Sung Won Kim, “Collision mitigation scheme for NDN-RIOT-OS based internet of things,” Far East Journal of Electronics and Communications, vol. 17, no. 4, pp. 863–876, 2017. View at Publisher · View at Google Scholar
  • Xueqin Liang, and Zheng Yan, “A survey on game theoretical methods in Human-Machine Networks,” Future Generation Computer Systems, 2017. View at Publisher · View at Google Scholar
  • Shaobo Zhang, Kim-Kwang Raymond Choo, Qin Liu, and Guojun Wang, “Enhancing privacy through uniform grid and caching in location-based services,” Future Generation Computer Systems, 2017. View at Publisher · View at Google Scholar
  • José Ramón Saura, Pedro Palos-Sánchez, and Luis Manuel Cerdá Suárez, “Understanding the Digital Marketing Environment with KPIs and Web Analytics,” Future Internet, vol. 9, no. 4, pp. 76, 2017. View at Publisher · View at Google Scholar
  • Muhidul Khan, Muhammad Alam, Yannick Moullec, and Elias Yaacoub, “Throughput-Aware Cooperative Reinforcement Learning for Adaptive Resource Allocation in Device-to-Device Communication,” Future Internet, vol. 9, no. 4, pp. 72, 2017. View at Publisher · View at Google Scholar
  • Xin Zhang, and Xiaoyuan Yang, “Trusted Property Remote Attestation Based on ABS,” Gongcheng Kexue Yu Jishu/Advanced Engineering Science, vol. 49, pp. 203–209, 2017. View at Publisher · View at Google Scholar
  • Yong Hao, Yuan Liu, Lin Zhao, and Shuo Wang, “Energy-optimal in orbit mission planning for agile remote sensing satellites,” Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, vol. 38, no. 6, 2017. View at Publisher · View at Google Scholar
  • Jochen Günther, “Digital Workplace – Herausforderungen und Implikationen für die Gestaltung,” HMD Praxis der Wirtschaftsinformatik, 2017. View at Publisher · View at Google Scholar
  • V. Bhanumathi, and C. P. Sangeetha, “A guide for the selection of routing protocols in WBAN for healthcare applications,” Human-centric Computing and Information Sciences, vol. 7, no. 1, 2017. View at Publisher · View at Google Scholar
  • Jinsong Gui, Lihuan Hui, and Naixue Xiong, “A Game-Based Localized Multi-Objective Topology Control Scheme in Heterogeneous Wireless Networks,” IEEE Access, vol. 5, pp. 2396–2416, 2017. View at Publisher · View at Google Scholar
  • Leibing Yan, Yin Lu, and Yerong Zhang, “An Improved NLOS Identification and Mitigation Approach for Target Tracking in Wireless Sensor Networks,” IEEE Access, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  • Trang Nguyen, Amirul Islam, Tanvir Hossan, and Yeong Min Jang, “Current Status and Performance Analysis of Optical Camera Communication Technologies for 5G Networks,” IEEE Access, vol. 5, pp. 4574–4594, 2017. View at Publisher · View at Google Scholar
  • Ruihong Jiang, Ke Xiong, Pingyi Fan, Yu Zhang, and Zhangdui Zhong, “Optimal Design of SWIPT Systems With Multiple Heterogeneous Users Under Non-linear Energy Harvesting Model,” IEEE Access, vol. 5, pp. 11479–11489, 2017. View at Publisher · View at Google Scholar
  • Chan Min Park, Rana Asif Rehman, and Byung-Seo Kim, “Packet Flooding Mitigation in CCN-Based Wireless Multimedia Sensor Networks for Smart Cities,” IEEE Access, vol. 5, pp. 11054–11062, 2017. View at Publisher · View at Google Scholar
  • Ting Li, Yuxin Liu, Longxiang Gao, and Anfeng Liu, “A Cooperative-Based Model for Smart-Sensing Tasks in Fog Computing,” IEEE Access, vol. 5, pp. 21296–21311, 2017. View at Publisher · View at Google Scholar
  • Hongya Fu, Jiankang Liu, Zhenyu Han, and Zhongxi Shao, “A Heuristic Task Periods Selection Algorithm for Real-Time Control Systems on a Multi-Core Processor,” IEEE Access, vol. 5, pp. 24819–24829, 2017. View at Publisher · View at Google Scholar
  • Cheng Chen, Xiangwu Meng, Zhenghua Xu, and Thomas Lukasiewicz, “Location-Aware Personalized News Recommendation With Deep Semantic Analysis,” IEEE Access, vol. 5, pp. 1624–1638, 2017. View at Publisher · View at Google Scholar
  • Muhammad Awais, Ashfaq Ahmed, Muhammad Naeem, Muhammad Iqbal, Waleed Ejaz, Alagan Anpalagan, and Hyung Seok Kim, “Efficient Joint User Association and Resource Allocation for Cloud Radio Access Networks,” IEEE Access, vol. 5, pp. 1439–1448, 2017. View at Publisher · View at Google Scholar
  • Abdul Wadood, Zulfiqar ar Ali, Sanaa Ghouzali, Budour ALfawaz, Ghulam Muhammad, and M. Shamim Hossain, “Biometric Security Through Visual Encryption for Fog Edge Computing,” IEEE Access, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  • Yiping Li, Xiaotong Zhang, Jun Zeng, Yadong Wan, and Fuqiang Ma, “A Distributed TDMA Scheduling Algorithm based on Energy-Topology Factor in Internet of Things,” IEEE Access, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  • Pablo Sotres, Juan Ramon Santana, Luis Sanchez, Jorge Lanza, and Luis Munoz, “Practical Lessons From the Deployment and Management of a Smart City Internet-of-Things Infrastructure: The SmartSantander Testbed Case,” IEEE Access, vol. 5, pp. 14309–14322, 2017. View at Publisher · View at Google Scholar
  • Xudong Wu, Ruofei Shen, Luoyi Fu, Xiaohua Tian, Peng Liu, and Xinbing Wang, “iBILL: Using iBeacon and Inertial Sensors for Accurate Indoor Localization in Large Open Areas,” IEEE Access, vol. 5, pp. 14589–14599, 2017. View at Publisher · View at Google Scholar
  • Carlos M. Lentisco, Luis Bellido, Juan Carlos Cuellar Q., Encarna Pastor, and Jose L. Arciniegas H., “QoE-Based Analysis of DASH Streaming Parameters Over Mobile Broadcast Networks,” IEEE Access, vol. 5, pp. 20684–20694, 2017. View at Publisher · View at Google Scholar
  • Ekaterina Markova, Irina Gudkova, Aleksandr Ometov, Ilya Dzantiev, Sergey Andreev, Yevgeni Koucheryavy, and Konstantin Samouylov, “Flexible Spectrum Management in a Smart City Within Licensed Shared Access Framework,” IEEE Access, vol. 5, pp. 22252–22261, 2017. View at Publisher · View at Google Scholar
  • Zhenhua Tan, and Liangliang He, “An Efficient Similarity Measure for User-Based Collaborative Filtering Recommender Systems Inspired by the Physical Resonance Principle,” IEEE Access, vol. 5, pp. 27211–27228, 2017. View at Publisher · View at Google Scholar
  • Mikhail Vilgelm, H. Murat Gursu, Wolfgang Kellerer, and Martin Reisslein, “LATMAPA: Load-Adaptive Throughput- MAximizing Preamble Allocation for Prioritization in 5G Random Access,” IEEE Access, vol. 5, pp. 1103–1116, 2017. View at Publisher · View at Google Scholar
  • Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, and Elisa Bertino, “Fine-Grained Analysis of Packet Loss in MANETs,” IEEE Access, pp. 1–1, 2017. View at Publisher · View at Google Scholar
  • Qichao Xu, Zhou Su, and Kan Yang, “Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint,” IEEE Access, vol. 5, pp. 14107–14118, 2017. View at Publisher · View at Google Scholar