Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2006 Issue 2
Study on phase transition phenomena in network traffic anomalies
WANG Xin;DING Li
..............page:184-188
Reachability testing algorithm for parallel program in heterogeneous network environment
WANG Wei;DU Cui-lan;ZHANG Hong-li
..............page:178-183
R-Net grid monitoring and alarming system design
YAO Yuan-zhe;DU Gui-lan;LIU Xin-ran;HE Miao;WANG Zi-juan;ZHANG Lu-wei
..............page:168-177
New network attack classification architecture
LIU Xinran
..............page:160-167
Research on analysis model of information systems survivability
LIN Xue-gang;XU Rong-sheng
..............page:153-159
Research on DNS authoritative server's performance and security
WANG Yao;HU Ming-zeng;YUN Xiao-chun;LI Bin;YAN Bo-ru
..............page:147-152
Anomaly detection of large scale network based on data streams
ZHENG Jun;HU Ming-zeng;YUN Xiao-chun;ZHENG Zhong
..............page:1-8
Research of a comprehensive IPv4/IPv6 firewall system based on network processor
ZHONG Ting;LIU Yong;LI Zhi-jun;QIN Zhi-guang
..............page:142-146
Task domain independent speech keyword detection system
HAN Jiang;LIU Xiao-xing;YAN Yong-hong;ZHANG Peng-yuan
..............page:137-141
Research and implement on the intrusion tolerant system
YIN Li-hua;HE Song
..............page:131-136
Network packet capture oriented INIC design and implementation
ZHANG Pan-yong;WANG Da-wei;ZENG Yu;LI Jun
..............page:125-130
Network latency clustering for detector placement on macroscopical prewarning
HE Hui;HU Ming-zeng;YUN Xiao-chun;ZHANG Hong-li
..............page:119-124
Efficient keyword spotting system for information retrieval
LUO Jun;OU Zhi-jian
..............page:113-118
Security architecture to support multiple security policies based on access control space
LI Li-ping;QING Si-han;HE Ye-ping;SHEN Qing-ni
..............page:107-112,118
Simulating method for TCP aggregated traffic of large scale network
CHEN Yu-feng;DONG Ya-bo;LU Dong-ming;PAN Yun-he
..............page:100-106
Chinese named entity identification using cascaded hidden Markov model
YU Hong-kui;ZHANG Hua-ping;LIU Qun;LV Xue-qiang;SHI Shui-cai
..............page:87-94
Trust-driven job scheduling heuristics for computing grid
ZHANG Wei-zhe;LIU Xin-ran;YUN Xiao-chun;ZHANG Hong-li;HU Ming-zeng;LIU Kai-peng
..............page:73-79
Policy-adaptive capability inheritance algorithm consistent with POSIX standard
SHEN Qing-ni;QING Si-han;HE Ye-ping;SHEN Jian-jun
..............page:66-72
User-habit based early warning of worm
WANG Ping;FANG Bin-xing;YUN Xiao-chun;PENG Da-wei
..............page:56-65
Hierarchical AAA in mobile IPv6 networks
XIAO Wen-shu;ZHANG Yu-jun;LI Zhong-cheng
..............page:50-55,65
Research on multi-objective grid task scheduling algorithms based on survivability and Makespan
WANG Shu-peng;YUN Xiao-chun;YU Xiang-zhan
..............page:42-49
Real-time anomaly detection model for worm mails in high-speed network
LUO Hao;FANG Bin-xing;YUN Xiao-chun;WANG Xin;XIN Yi
..............page:35-41
Constructing optimized Boolean functions
CHEN Wei;YANG Yi-xian;NIU Xin-xin
..............page:22-28
Approach for topology partitioning in parallel network simulation
WANG Xiao-feng;FANG Bin-xing;YUN Xiao-chun;ZHANG Hong-li
..............page:16-21
Frequent items maintaining algorithms in network traffic analysis
DU A-ning;CHENG Xiao-ming
..............page:9-15