Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2010 Issue 12
Hybrid artificial fish swarm based handover decision scheme with ABC supported
WANG Xing-wei;QIN Pei-yu;GUO Lei;HUANG Min;JIANG Ding-de
..............page:72-81
Research of the mathematic model of synthetic range profile
CHEN Yue-bin1;PENG Wei2;FAN Jing1;GAO Fei1
..............page:111-116
Research on deep differential fault analysis against MIBS
ZHAO Xin-jie1;WANG Tao 1;WANG Su-zhen2;WU Yang1
..............page:82-89
Watermarking algorithm for image authentication based on second generation Bandelet
LIU Xu-chong1;2;LUO Yong1;3;WANG Jian-xin1;WANG Jie1
..............page:123-130
Study on dynamic trust metric of trusted network based on state and behavior associated
LI Dao-feng;YANG Yi-xian;GU Li-ze;SUN Bin
..............page:12-19
Research on packet convergence sublayer classification algorithm for WiMAX system
ZHANG Qing-bo1;2;HE Jia-ming1;ZHU Yan3
..............page:117-122,130
Fuzzy trust model for wireless sensor networks with intrusion tolerance
WANG Liang-min1;GUO Yuan-bo2;ZHAN Yong-zhao1
..............page:37-44,54
Approach of detecting LDoS attack based on time window statistic
WU Zhi-jun;ZENG Hua-long;YUE Meng
..............page:55-62
Error detection and concealment based on characteristic clustering of image
LI Guo-bo;CHEN Gang;WU Bai-feng
..............page:1-11
DPM-based method for tracking maneuvering targets in wireless sensor networks
LIN Jin-zhao1;3;LI Guo-jun2;3;ZHOU Xiao-na2;ZHOU Dao-jun 2;JIANG Yong 2
..............page:90-96
Social network-based trustworthy routing in delay tolerant networks
YU Hai-zheng1;2;MA Jian-feng1;BIAN Hong3;Xidian University;Xi’an 710071;China; 2.College of Mathematics and System Sciences;Xinjiang University;Urumqi 830046;China; 3.School of Mathematical Sciences;Xinjiang Normal University;Urumqi 830054;China)
..............page:20-26
System of systems method and formal function decomposition for software systems
LU Han-hua;ZHANG Shun-yi;WANG Ya-shi;MIN Li-juan
..............page:131-139
Distance-based target tracking algorithm in binary sensor network
SUN Xiao-yan1;2;3;LI Jian-dong1;HUANG Peng-yu1;ZHANG Wen-zhu1
..............page:140-146
Identity-based group key management scheme for space networks
LUO Chang-yuan;LI Wei;HUO Shi-wei
..............page:104-110
Multi-antenna space-time blind receiving approach based on independent component analysis
XU Hong-ji1;2;3;4;LIU Ju 1;2;XU Shu-zheng 3;YANG Hua-zhong 3;ZHUANG Wen-jun4
..............page:63-71
Research on side information generation algorithm for Wyner-Ziv video coding
SONG Bin;HE Hong;LIU Hai-hua;QIN Hao
..............page:97-103