An Approach to the Classification of Cutting Vibration on Machine Tools
(Login to Download)
A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark
(Login to Download)
The Treewidth of Induced Graphs of Conditional Preference Networks Is Small
(Login to Download)
Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce
(Login to Download)
Cross-Entropy-Based Energy-Efficient Radio Resource Management in HetNets with Coordinated Multiple Points
(Login to Download)
Acknowledgement to Reviewers of Information in 2015
(Login to Download)
Hierarchy and the Nature of Information
(Login to Download)
Communication-Theoretic Model of Power Talk for a Single-Bus DC Microgrid
(Login to Download)
Nearest Neighbor Search in the Metric Space of a Complex Network for Community Detection
(Login to Download)
Throughput Capacity of SelfishWireless Ad Hoc Networks with General Node Density
(Login to Download)
Information Extraction Under Privacy Constraints
(Login to Download)
Ultra-Reliable Link Adaptation for Downlink MISO Transmission in 5G Cellular Networks
(Login to Download)
On Solving the Fuzzy Customer Information Problem in Multicommodity Multimodal Routing with Schedule-Based Services
(Login to Download)
CoSpa: A Co-training Approach for Spam Review Identification with Support Vector Machine
(Login to Download)
Invariance as a Tool for Ontology of Information
(Login to Download)
A Comparative Study on Weighted Central Moment and Its Application in 2D Shape Retrieval
(Login to Download)
A Novel Local Structure Descriptor for Color Image Retrieval
(Login to Download)
A Minimum-Entropy Based Residual Range Cell Migration Correction for Bistatic Forward-Looking SAR
(Login to Download)
Feature Engineering for Recognizing Adverse Drug Reactions from Twitter Posts
(Login to Download)
The Potential of Three Computer-Based Communication Activities for Supporting Older Adult Independent Living
(Login to Download)
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology
(Login to Download)
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments
(Login to Download)
Using Proven Reference Monitor Patterns for Security Evaluation
(Login to Download)
An Approach to the Match between Experts and Users in a Fuzzy Linguistic Environment
(Login to Download)
On-Body Smartphone Localization with an Accelerometer
(Login to Download)
A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder
(Login to Download)
Minimax Duality for MIMO Interference Networks
(Login to Download)
User in the Loop: Adaptive Smart Homes Exploiting User Feedback—State of the Art and Future Directions
(Login to Download)
Implementation Support of Security Design Patterns Using Test Templates
(Login to Download)
A Framework for Measuring Security as a System Property in Cyberphysical Systems
(Login to Download)
Speech Compression
(Login to Download)
Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability
(Login to Download)
Geospatially Constrained Workflow Modeling and Implementation
(Login to Download)
Measuring Knowledge Management Performance in Organizations: An Integrative Framework of Balanced Scorecard and Fuzzy Evaluation
(Login to Download)
Computer-Aided Identification and Validation of Privacy Requirements
(Login to Download)
IoT Privacy and Security Challenges for Smart Home Environments
(Login to Download)
Real-Time Hybrid In-Station Bus Dispatching Strategy Based on Mixed Integer Programming
(Login to Download)
Investigation of Voltage Control at Consumers Connection Points Based on Smart Approach
(Login to Download)
Information and Meaning
(Login to Download)
Lateral Cross Localization Algorithm Using Orientation Angle for Improved Target Estimation in Near-Field Environments
(Login to Download)
A Novel Global Path Planning Method for Mobile Robots Based on Teaching-Learning-Based Optimization
(Login to Download)
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
(Login to Download)
Design of Hybrid Wired/Wireless Fieldbus Network for Turbine Power Generation System
(Login to Download)
Standard Compliant Hazard and Threat Analysis for the Automotive Domain
(Login to Download)
Efficient Software HEVC to AVS2 Transcoding
(Login to Download)
Optimal Threshold Determination for Discriminating Driving Anger Intensity Based on EEG Wavelet Features and ROC Curve Analysis
(Login to Download)
Packet-Forwarding Algorithm in DTN Based on the Pheromone of Destination Node
(Login to Download)
Smart Homes and Sensors for Surveillance and Preventive Education at Home: Example of Obesity
(Login to Download)
The Role of Physical Layer Security in IoT: A Novel Perspective
(Login to Download)
The Information Content of Accounting Reports: An Information Theory Perspective
(Login to Download)
An mHealth Tool Suite for Mobility Assessment
(Login to Download)
Introduction to the Special Issue on Evaluating the Security of Complex Systems
(Login to Download)
Visually Lossless JPEG 2000 for Remote Image Browsing
(Login to Download)
Lazy Management for Frequency Table on Hardware-Based Stream Lossless Data Compression
(Login to Download)
Retrocausality in Quantum Phenomena and Chemical Evolution
(Login to Download)
NIRFaceNet: A Convolutional Neural Network for Near-Infrared Face Identification
(Login to Download)
A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks
(Login to Download)
Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures
(Login to Download)
Studying Organizations on Instagram
(Login to Download)
A Benchmarking Analysis of Open-Source Business Intelligence Tools in Healthcare Environments
(Login to Download)
A Survey on Data Compression Methods for Biological Sequences
(Login to Download)
Government-Driven Participation and Collective Intelligence: A Case of the Government 3.0 Initiative in Korea
(Login to Download)
Access to Information for Learning by Using Assistive Technology for Undergraduate Students with Disabilities in Northern Thailand
(Login to Download)
Symmetries, Information and Monster Groups before and after the Big Bang
(Login to Download)
PACP: A Position-Independent Activity Recognition Method Using Smartphone Sensors
(Login to Download)
A Credit-Based Congestion-Aware Incentive Scheme for DTNs
(Login to Download)
Joint Modulation Classification and User Number Detection for Multiuser MIMO-STBC Systems
(Login to Download)
Digital Citizen Participation within Schools in the United Kingdom and Indonesia: An Actor–Network Theory (ANT) Perspective
(Login to Download)
A Discriminative Framework for Action Recognition Using f-HOL Features
(Login to Download)
Travel Mode Detection Based on GPS Raw Data Collected by Smartphones: A Systematic Review of the Existing Methodologies
(Login to Download)
Who Leads Advocacy through Social Media in Japan? Evidence from the “Tsukuba Civic Activities Cyber-Square” Facebook Page
(Login to Download)
Reaching Citizens’ Engagement by Services: Swiss Use Case
(Login to Download)
A New Prospect Projection Multi-Criteria Decision-Making Method for Interval-Valued Intuitionistic Fuzzy Numbers
(Login to Download)