Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2006 Issue z1
Resolution to IPv4 upgrading to IPv6 of Yunnan university campus network
WANG Sha;LI Han-bin;ZHANG Xue-jie;DENG Shi-kun
..............page:20-23
QoS controlled multicast routing mechanism based on IPv6
WANG Xing-wei;GAO Nan;WANG Qi;HUANG Min
..............page:15-19
Transition of socket applications from IPv4 to IPv6
ZANG Shao-gang;LIANG Sheng;FU Guang-xuan
..............page:24-27
From sender's domain trust to IPv6's client absolutely trust
SUN Yi;PAN Jie;YAN Hua
..............page:28-30
Research of transition technology for IPv4/IPv6 & deploy of the application network
JING Shan;SUN Run-yuan;CHEN Zhen-xiang;YANG Bo
..............page:35-39
Security strengthened return routability mechanism mechanism
ZHAO Hui-ning
..............page:40-42
Design of secure multicast architecture on CERNET 2
LIU Wen-qin;LI Zhi-tang;ZHANG Ji-ping;LI Yao
..............page:43-47
Covariance detection model of DDoS
WEI Xiang-rong;LI Zhi-tang
..............page:72-75
Tree-rule-based approach to network security event correlation
PAN An-qun;LI Zhi-tang;LEI Jie
..............page:76-80
DWT domain public zero-watermarking method based on singular values
CHEN Chen;CHENG Li-zhi
..............page:81-84
IP traceback scheme based on histroy marking
HUANG Bao-feng
..............page:85-87
Adaptive DoS detection technique based on ant clustering
YANG Yi;ZHENG Jian-de
..............page:88-91
Security event verification based on cooperation
XING Su-xiao;GONG Jian
..............page:92-97
Policy routing on Linux for multi-homing campus network
ZHANG Huan-jie;MENG Qing-yu;YANG Shou-bao
..............page:130-133
Method for P2P traffic identification based on twofold features
YANG Yue-Xiang;WANG Rui;TANG Chuan;LI Qiang
..............page:134-139
Design and implementation of backup domain name system
CHEN Gang;LV Xu-kang;WANG Zong-min
..............page:140-142
Design and implementation of distance configuration management system based on SSL VPN
WANG Jin-Song;ZHANG Yi;LOU Jia;WU Gong-Yi;MIAO Ling
..............page:143-146
Study of network topology discovery based on mobile agent
HUANHG Yan-Bo;YU Ying
..............page:147-150
Fairness optimization mechanism for 802.11 Mesh networks based on the number of competition stations and Hops
LI Feng-hua;WU Jian-ping;LI He-wu;CHEN Rong-di
..............page:159-163
Process migration with host identity protocol
CHEN Jun-xia;TANG Ke;WANG Wen-yong
..............page:164-167
Study on fast handover in HMIP6 based on character
SONG Jian;ZHANG Bao-jie;SUN Wei;CHE Rong;WANG Wei
..............page:168-172
Research and implementation of secure Web mandatory service mechanisms supporting IPv4 and IPv6
WANG Yu;LIU Jun;WEN Zhan-kao;WANG Xing-wei
..............page:173-176
Distributed system design of conformance testing for BGP4+
LI Hua;YE Xin-ming;WU Cheng-yong;DING Xue-lian
..............page:151-154
Wireless voice over IP in Peking university
SHANG Qun;WANG Zhu-wei;ZHANG Bei
..............page:155-158
Study and implementation on visualization of P2P systems
LU Zhi-xue;MA Hao;SONG Wei-jia;YANG Jia;ZHANG Bei
..............page:241-245
Video conference control manage system design and realization
WANG Zhen-yu;Zhang Ling;YUAN Hua
..............page:269-272
Designing Bluetooth-UPnP software bridge
LI Yin-zhuang;ZHANG Jian-hua;XIAO Yong-ping
..............page:273-276
Course-selecting support system based on Web
HUANG Jing-wen;WEI Hua
..............page:277-279
DPFSL:decreasing probability flooding algorithm in P2P network
LI Zhi-tang;YU Wan-neng;LIU Gang
..............page:246-250
Design and implementation of software system sharing database of technology archived article based on Internet
HE Yu;TU Xiao-ying;GAO Hong-feng;HU Yu-hong;WANG Yi-bo
..............page:251-254
ENICE: an application level multicast protocol considering node heterogeneity
LIN Yu-song;HAO Xing-yuan;WANG Bin-qiang;WANG Zong-min
..............page:255-261
Formal modeling and analysis method of network survivability
ZHAO Guo-sheng;WANG Hui-qiang;LI Ming-jun
..............page:48-52
Design and implementation of single IXP2400 network processor based NAT-PT system
LI Ying-zhuang;HU Xiao-wei;LI Jian-hong
..............page:11-14,19
Experiment study on HDTV based on SSM/IPv6
ZHANG Le;LI Chong-rong;RUI Hua-xia;ZHAO Qing-guo
..............page:6-10
Towards NGI: a case study of multicast-bridge in IPv6-CJ
LI Zi-mu;LI Xing;WU Jian-ping
..............page:1-5
Research of a potential worm propagation model based on pure P2P principle
LUO Xing-rui;YAO Yu;GAO Fu-xiang
..............page:53-58
Design and realization of integrated classifier based on rough Set
ZHU You-chan;XIONG Wei;JING Yong-wen;GAO Ya-bin
..............page:63-67
Research on the optimization of NISC6IDS intrusion detection system
LIN Zhao-wen;WANG Kun-peng;MA Yan
..............page:68-71
Chaotic behavior decision of complex system and fractal based chaotic time serials modeling
XU Zhe;WANG Pei-rong;FU Chong;ZHU Wei-yong;WANG Xing-wei
..............page:199-203
SE-based network specific information 3D inspection system
LIU Zuo-da;XU Jing-fang;CHEN Mao-ke;LI Xing
..............page:204-207
Performance analysis of IP QoS provision model
SUN Danning;Moonsik Kang
..............page:208-213
IP Trace data based on a CERNET backbone
SHI Bing;DING Wei;GAO Ya-dong;GONG Jian
..............page:214-218
Service-oriented GMPLS survivability algorithm
QU Hua;SU Xing
..............page:219-223
Study on passive network performance measurement
HUANG Li-Sheng;WANG Wen-Yong
..............page:224-226,231
Grid resource discovery model based on layered topology
YANG Yong-jian;SUN Yong-xiong;ZHANG Wei
..............page:227-231
Novel watermark algorithm based on communication model and data fusion
CHEN Li-ping;YAO Zhi-qiang;WU Zi-Wen
..............page:232-235
Deployment, implementation and performance analysis of uncompressed HDV(high definition video) System
ZHAO Qing-guo;LI Chong-rong;BAO Cong-xiao;RUI Hua-xia
..............page:236-240
Design and implementation of anti-spam email system based on decision trees
QU Qing-hai;WANG Wei-nong
..............page:262-265
Mobile computing based on publish/subscribe middleware
LIN Yuan-kang
..............page:266-268
Novel algorithm for content-based image filtering
WEN Ze-feng;YUAN Hua
..............page:280-284
Composed Chaos-based image encryption algorithm
WANG Pei-rong;XU Zhe;FU Chong;ZHU Wei-yong;WANG Xing-wei
..............page:285-289
Billing system based on Linux ethernet bridge mechanism
TAN Yue-sheng;ZHANG Xiao-ling;JIA Yuan-chun;GU Rui-chun
..............page:290-294
Construction planning and design of MAN in Kunming university city
Deng Shi-kun;Yang Hong-wei;Yang yong;Chen rong
..............page:295-298
Research and application of the algorith ms for mining association rules based on clustering
FU Ai-ying;ZENG Qing-wei;XU Zhi-hai;YAN Zhi-hui
..............page:177-180
Design of integrated digital campus based unified framework
LIANG Zheng-he;ZHANG Xin-hua;ZHANG Guo-bao;BIAN Hai-hong
..............page:181-183,193
The Impact of non-cut link failures on network traffic
ZHAO Feng;WANG Bao-sheng;LU Ze-xin;LIU Ya-ping
..............page:184-188
P2P content distribution model and optimization analysis of link spending
CHEN Zhen-xiang;WANG Hai-yang;WU Jian-ping;CHEN Mao-ke;YANG Bo
..............page:194-198
IP control gateway cluster system based on half-connection state detection technology
YANG Wei;ZHU Qiao-ming;LI Pei-feng;QIAN Pei-de
..............page:98-102
Algorithm for detecting inconsistent advertisement base on rib-in-policy-history
XU Xin;YUN Jing;GAO Yuan
..............page:103-107
Authentication and accounting based on IP control gateway and 802.1x in a campus network
YANG Jia;SONG Wei-jia;ZHANG Bei;LI Xiao-nan;ZHANG Xiao-jun
..............page:108-112
Design and implement of distributing whois system
QIAN Jie;ZHANG Yang;ZHANG Bei;LIU He-xiang
..............page:113-116
Design and management of nonattendant host center in campus network
GAO Hong-feng;HE Yu;YU Bin;WANG Yi-bo
..............page:117-120
Multiple egress routing solution on GLBP and IP SLAs protocol
REN Chen;LI Wei-ying;YAN Hua
..............page:121-125
Design and implementation of AAA system based on IPv6
MENG Fang;AN Chang-qing;YANG Jia-hai
..............page:126-129,133