Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2006 Issue 6
Sort of data driven frequency-domain echo-cancellation algorithm
ZHAO Hai-jun;CUI Meng-tian;LI Ming-dong
..............
page:134-140
Medium access control of multimedia CDMA systems with effective spectral bandwidth distribution
PAN Su;FENG Guang-zeng
..............
page:126-133
Performance analysis of the network communication based on AMR speech coding by using NS
JIA Long-tao;BAO Chang-chun
..............
page:121-125,133
Design and simulation of a tunable frequency OTA -C Chebyshev filter
JIANG Jin-guang;WANG Yao-nan
..............
page:81-86
Novel ASON routing implementation
LI Jian;YANG Ai-ping;GU Wan-yi;ZHANG Jie
..............
page:72-80
Performance simulation and analysis of SIP-based call setup over AODV-routed MANET
ZHANG Xiao-yan;DU Xiao-feng;ZHU Xiang-hua
..............
page:64-71
Low complexity MIMO-OFDM channel estimation based on space time block training sequence
DONG Liang;CAO Xiu-ying;BI Guang-guo
..............
page:57-63
Single channel multicomponents separating
CAI Quan-wei;WEI Ping;XIAO Xian-ci
..............
page:49-56
Blind video watermarking algorithm based on correlations between neighboring frames
GAO Qi;LI Ren-hou;LIU Lian-shan
..............
page:43-48
New approach for 2-D spectrum estimation--parameter weight method
BAO Zheng;WANG Yong-liang
..............
page:16-20
Frequency offset estimator for OFDM with time-frequency training sequence
JIANG Yan-xiang;WANG Dong-ming;GAO Xi-qi;YOU Xiao-hu
..............
page:10-15
Distributed multicast algorithm for building an energy-efficient shared tree in ad hoc networks
LUO Yu-hong;WANG Jian-xin;CHEN Song-qiao
..............
page:1-9
New data fusion model of intrusion detection--IDSFP
TIAN Jun-feng;ZHAO Wei-dong;DU Rui-zhong;CAI Hong-yun
..............
page:115-120
Intrusion detection method based on machine learning
TIAN Xin-guang;GAO Li-zhi;ZHANG Er-yang
..............
page:108-114
Turbo detection-decoding method for bit-interleavered random layered space-time codes
LI Xiao-wei;CHEN Fang-jiong;WEI Gang
..............
page:102-107,114
Research on formal security policy model specification and its formal analysis
LI Li-ping;QING Si-han;ZHOU Zhou-yi;HE Jian-bo;WEN Hong-zi
..............
page:94-101
Large scale network worm detection using automatic signature extraction
WANG Ping;FANG Bin-xing;YUN Xiao-chun
..............
page:87-93
Researches on the problem of link disjoint paths pair with QoS constraints
ZHANG Pin;ZHANG Jian-wu;LI Le-min;WANG Sheng
..............
page:36-42
Performance analysis of generalized processor sharing based on fractal leaky bucket regulators
CHEN Zhi-gang;ZHANG Lian-ming;DENG Xiao-heng;ZHAO Ming
..............
page:29-35,42
Research on fault-recovery model and scheme in dual-system redundancy router
JI Meng;YU Shao-hua;ZHAN Yi-chun
..............
page:21-28