Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecommunications Science
1000-0801
2014 Issue 11
Research on Sensitive Data Protection Technology on Cloud Computing
Gong Xue;,Hu Kun;,Liu Minghui;,Qu Dalin;,Zhang Ni;,Zhang Yunyong;
..............page:1-8
Study on Cloud Computing Billing Issues
Chen Hao;,Tao Ye;,Zhang Ni;,Zhang Yunyong;
..............page:9-13,21
A Kind of OpenStack Auto-Deployment Architecture Based on Workflow
Fang Bingyi;,Zhang Yuan;,Zhang Yunyong;
..............page:14-21
Cloud Resource Allocation Method Based on Elastic Resource Adjustment
Fang Bingyi;,Feng Weibin;,Yin Bo;,Zhang Yunyong;
..............page:22-26,32
Research on the Mobile CDN Integration Architecture in Virtualized EPC
Dong Hui;,Fang Bingyi;,Li Sufen;,Wu Jun;,Zhang Yunyong;
..............page:27-32
Research on Virtualization of Mobile Core Network Architecture
Fang Bingyi;,Li Sufen;,Wu Jun;,Xiong Wei;,Zhang Yunyong;
..............page:33-37
Construction of Smart City Based on Open Government Data
Gu Lei;,Wang Yi;
..............page:38-43
Heterogeneous Information Networks Node Similarity Measurement Based on Feature Sub-Graph
Li Chuan;,Li Yanmei;,Luo Qian;,Xu Hongyu;,Yang Ning;,Zhang Biao;
..............page:66-72
Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game
Cao Qiying;,Han Risheng;,Huang Longjun;,Li Hongjie;,Shen Shigen;,Tu Angyan;
..............page:73-79
Research on Data Gathering Algorithm Based on Fairness in Cognitive Radio Network
Wang Xiaoming;,Zhang Jiankang;
..............page:80-86,104
A SVM Based Spectrum Prediction Scheme for Cognitive Radio
Chen Xu;,Lu Huaxiang;,Xu Yuan;
..............page:87-92
Tenant-Based Hierarchical Virtual Machine Placement Policy in Cloud
Chen Jun;,Li Jing;,Wang Shuo;,Zhang Zhao;,Zhou Yanxia;
..............page:93-98
Design and Implementation of Smart Home Managemen System Based on RESTful Web Services
Gu Quanqi;,Li Zhihua;,Tang Jianfei;,Xue Liang;,Zhao Jijun;
..............page:99-104
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Yang Chengyue;,Zhang Suxiang;,Zhang Yiying;,Zou Weifu;
..............page:105-109,115
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Fan Jiulun;,Liu Jianhua;,Wu Hao;,Zhang Junsheng;
..............page:110-115
Study on Market Situation and Management Specifications of Short-Range Radio Communication Devices
Liu Xiaoyong;,Liu Xinhao;,Song Qizhu;,Tao Hongbo;,Wang Junfeng;,Wang Xiaobo;
..............page:116-124
Research on Sensitive Information Protection of Carriers' Big-Data Platform
Cai Xin;,Pan Wenyu;,Ruan Yilong;,Yao Xiaohui;
..............page:125-130
Security Vision of 5G
Guo Shu;,Qi Minpeng;,Zhu Hongru;,Zhuang Xiaojun;
..............page:131-134
Research on Forwarding Performance for Network Function Virtualization
Ou Liang;,Tang Hong;
..............page:135-139,172
SDN and Traffic Fine Operation
Wang Subin;,Zhu Yongqing;
..............page:145-153
The Unified-Operation-Oriented Big Data Strategy for Telecom Operators
Han Jing;,Wang Jianquan;,Wang Yasong;,Zhang Zhijiang;
..............page:154-158
Research on Packet Enhanced OTN Equipment and Networking
Cheng Ming;,Zhang Jun;,Zhou Zhou;,Zhu Jun;
..............page:159-165
Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control
Chen Qingnian;,Li Cheng;,Li Lika;,Ma Zexiong;
..............page:166-172