Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper,we propose a user participation behav
Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control
In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the cur
Considering that there exists a strong similarity between behaviors of users and intelligence of swarm of agents,in this paper we propose a novel user recommend
Recently, trimming Soft-output Viterbi algorithm(T-SOVA) has been proposed to reduce the complexity of SOVA for Turbo codes. In its fi rst stage, a dynamic algo