Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2008 Issue 9
Security on a cryptographic model based on chaos
WEI Jun;LIAO Xiao-feng;YANG Ji-yun
..............
page:134-140
Push based buffer setting strategy for high density linecard of small buffer size
LI Yu-feng;QIU Han;LAN Ju-long;WANG Bin-qiang
..............
page:124-133
Access control model and its application for collaborative information systems
LI Feng-hua;WANG Wei;MA Jian-feng;LIU Hong-yue
..............
page:116-123
Study on RF module in UHF OFDM node for mobile multimedia sensor network
PANG Rui-fan;JIANG Jian;WANG Ying-guan;ZHANG Hong-jun;LIU Hai-tao
..............
page:111-115
Quasi-cyclic extension based on PEG algorithm for construction of LDPC codes
LEI Jing;WANG Jian-hui;TANG Chao-jing
..............
page:103-110
Value-based adoption of MDS: an empirical investigation
ZHOU Yi;MENG Wei-dong;DU Hui-ying;WU Ping-yao
..............
page:97-102,110
Provable secure digital watermarking scheme
YUAN Zheng
..............
page:91-96
Parallel MAC protocol based on geographical location information and power control in ad hoc networks
LEI Lei;XU Zong-ze
..............
page:81-90
Improved speech enhancement based on spectral subtraction and auditory masking effect
ZHAO Xiao-qun;HUANG Xiao-shan
..............
page:73-80
Extending locked range of digital phase-locked loop by prediction estimation of states
ZHAO Yi-bo;LUO Xiao-shu;ZHANG Dao-yang;FENG Jiu-chao
..............
page:68-72
Research of ZCZ array pair and its construction methods
GAO Jun-ping;LI Qi;DAI Ju-feng;LIU Li
..............
page:62-67
Partition detection for large scale ad hoc networks
LI Jian-dong;TIAN Ye;SHENG Min;ZHANG Yan;YAO Jun-liang
..............
page:54-61
Optimal path identification to defend against DDoS attacks
JIN Guang;YANG Jian-gang;LI Yuan;ZHANG Hui-zhan
..............
page:46-53
Design of low power and high speed FFT/IFFT processor for UWB system
LIU Liang;WANG Xue-jing;YE Fan;REN Jun-yan
..............
page:40-45
Deterministic upper bounds on QoS performance about wireless ad hoc network based on network calculus
LI Qing-hua;CHEN Zhi-gang;ZHANG Lian-ming;ZENG Feng;LI Xiang
..............
page:32-39
H.264 rate-distortion model based joint source channel coding scheme over wireless channels
GAO Xue-juan;ZHUO Li;SHEN Lan-sun
..............
page:24-31,39
New dynamic load balancing method based on roulette wheel selection and its implementation
ZOU Yuan-ping;LIU Hong-lin
..............
page:18-23
Authorization delegation mechanism based trust level in grid computing
DENG Yong;CHEN Jian-gang;WANG Ru-chuan;ZHANG Lin
..............
page:10-17
SyncPoint based scoring method in IDS evaluation
YANG Wang;GONG Jian;WU Xiong
..............
page:1-9