Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing University of Posts and Telecommunications
1007-5321
2016 Issue 3
Survey on Caching Techniques of Information Centric Networking
ZHANG Tian-kui;SHAN Si-yang;XU Xiao-geng;LIU Yin-long;Beijing Key Laboratory of Network System Architecture and Convergence;Beijing University of Posts and Telecommunications;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:1-15
Sensitive Information Leakage Detection for Android Applications Based on Fine-Grained Taint Tracking Strategies
YANG Tian-chang;CUI Hao-liang;NIU Shao-zhang;SONG Wen;Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia;Beijing University of Posts and Telecommunications;
..............page:16-21
On Particle Swarm Optimization for Multi-Frequency Channel Interference Alignment
ZOU Wei-xia;WANG Duo-wan;DU Guang-long;Key Laboratory of Universal Wireless Communications;Ministry of Education;State Key Laboratory of Millimeter Waves;Southeast University;
..............page:22-26
Improved Structure of Even-Arrangement Channelized Based on FRM
ZHANG Wen-xu;CHEN Ya-jing;CHEN Tao;DOU Zheng;College of Information and Communication Engineering;Harbin Engineering University;
..............page:27-33
Probabilistic Spreading Models for Improving Recommendation Diversity
CAI Guo-yong;ZHANG Dong;LIN Yu-ming;WEN Yi-min;Guangxi Key Laboratory of Trusted Software;Guilin University of Electronic Technology;
..............page:34-38
A Method of Energy Optimization Based on Time Series for Cellular Network
GAO Ling;CHEN Yan;WANG Hai;REN Jie;School of Information Science and Technology;Northwest University;
..............page:39-43
A Cache Replacement Policy Adapting to the Request Access Pattern
HUANG Zhi-bin;ZHOU Feng;MA Hua-dong;Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia;Beijing University of Posts and Telecommunications;
..............page:44-48+53
News Image Caption Line Segmentation Algorithm Based on Template Matching
WANG Zhi-heng;GUO Chao;LIU Hong-min;College of Computer Science and Technology;Henan Polytechnic University;
..............page:49-53
Multi-Directional Searching Based Consistent Flow Updating Scheme in Software Defined Networking
LIU Jiang;HU Xiao-lu;HUANG Tao;LIU Yun-jie;Beijing Laboratory of Advanced Information Networks;Beijing University of Posts and Telecommunications;Beijing Advanced Innovation Center for Future Internet Technology;
..............page:54-59
Constant-Time Lightweight RFID Mutual Authentication Protocol
ZHOU Jing-xian;ZHOU Ya-jian;GU Zhao-jun;Information Security Evaluation Center;Civil Aviation University of China;Information Security Center;Beijing University of Posts and Telecommunications;
..............page:60-63+90
Joint Power Control and Channel Assignment in Wireless Mesh Network
SHI Wen-xiao;WANG En-dong;WANG Ji-hong;OUYANG Min;College of Communication Engineering;Jilin University;
..............page:64-69
Fuzzy Tri-Clustering Based on Information Bottleneck
LIU Yong-li;WAN Xing;School of Computer Science and Technology;Henan Polytechnic University;
..............page:70-74
An Algorithm of Randomly Intensive Dissemination of Video Fragments in Opportunistic Network
WANG Xiao-ming;ZHU Teng-jiao;LI Peng;ZHANG Li-chen;ZHANG Dan;School of Computer Science;Shaanxi Normal University;
..............page:75-79
A Distributed Training Method for Sparse Kernel Machine over WSN
JI Xin-rong;HOU Cui-qin;HOU Yi-bin;Beijing Engineering Research Center for IOT Software and Systems;Beijing University of Technology;School of Information and Electrical Engineering;Hebei University of Engineering;
..............page:80-84
The Hardware Implementation of Adaptive Non-Linear Sampling Algorithm
LI Yang;WU Hao;LIU Bin;Department of Computer Science and Technology;Tsinghua University;
..............page:85-90
Relay Node Placement Algorithm under the Condition of Multi Greedy Criterion
WANG Zhu;HU Pin;DONG Meng-meng;TONG Xiao-jun;School of Computer Science and Technology;Harbin Institute of Technology at Weihai;School of Information and Electrical Engineering;Harbin Institute of Technology at Weihai;
..............page:91-94+104
A C-Language Oriented Fault Injection Platform
QIAN Gen-nan;GONG Yun-zhan;WANG Ya-wen;XING Ying;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;Automation School;Beijing University of Posts and Telecommunications;
..............page:95-99
Packet Reordering-Controlled Load Distribution Model for Real-Time Multipath Transport
ZHANG Wei;LEI Wei-min;LI Guang-ye;GUAN Yun-chong;LI Hao;Department of Communication and Electronic Engineering;College of Computer Science and Engineering;Northeastern University;
..............page:100-104
Information System Risk Control Method Based on Work-Flow
YANG Hong-yu;CHENG Xiang;School of Computer Science and Technology;Civil Aviation University of China;
..............page:105-109
Routes Planning Algorithm for Mobile Data Collecting in Wireless Sensor Networks
ZHU Jing-hua;YIN Xu-ming;WANG Nan;LI Jin-bao;WU Zhi-qiang;School of Computer Science and Technology;Heilongjiang University;
..............page:110-113
A Data Clustering Algorithm over Real Time High-Volume Data Streams
ZHAO Jin-dong;YU Yan-wei;LIU Jing-lei;Computer and Control Engineering College;Yantai University;
..............page:114-119
Multi-Objective Joint Optimization Based Mobile Relay Selection Scheme
ZHAO Ji-hong;ZHANG Yan-ping;QU Hua;XU Xi-guang;The School of Electronic and Information Engineering;Xi’an Jiaotong University;The School of Telecommunication and Information Engineering;Xi’an University of Posts and Telecommunications;
..............page:120-125
Crosstalk Cancellation Method of Multiple Coupled Transmission Lines Based on Channel Transmission Matrix
WANG Ya-fei;School of Information and Communication Engineering;Beijing Information Science and Technology University;
..............page:126-131
Vehicle Sensor Self-Powered Technology Research of Electromagnetic and Piezoelectric Hybrid Mode
SANG Ying-jun;FAN Yuan-yuan;WU Shang-guang;LI Man;WANG Ye-qin;Faculty of Automation;Huaiyin Institute of Technology;Electrical Engineering Scholl;Southeast University;
..............page:132-135+142
The General Theory of Security(10)——Winning Number’s Limitations for the Attacking and Defensing
YANG Yi-xian;NIU Xin-xin;Information Security Center;Beijing University of Posts and Telecommunications;
..............page:136-142