Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2010 Issue 7
Relationship among three kinds of cryptographic Boolean functions with special Walsh spectrum
hu bin ; jin chen hui ; shao zeng yu
..............
page:104-109
User authentication and monitoring based on mouse behavioral features
shen chao ; cai zhong min ; guan xiao hong ; fang chao ; du you tian
..............
page:68-75
Design and analysis of the tweakable blockciphers based on the MISTY structure
wen feng tong
..............
page:76-80,87
Renewable (t, n) threshold secret sharing scheme based on one-way hash chain
li da wei ; yang geng
..............
page:128-135
Algorithm for the k-means clustering based on minimum cluster size
wang shou qiang ; zhu da ming
..............
page:46-52
Image denoising based on spectral graph theory and random walk kernel
zeng xiao ping ; liu zuo ; liu guo jin
..............
page:116-121
BER of non-regeneration cooperative system based on destination-driven
cheng wei jun ; ma zhi hong ; zhu bai cheng
..............
page:136-140
Fast multiple reference frame selection algorithm for H.264 based on spatial correlation
xu jing ; zhou bing ; huang xue li ; li zuo ; cao lei
..............
page:40-45
Utility-based resource allocation and scheduling for CR-MIMO-OFDMA/TDM system
hu hao ; song jun de ; ci song ; tang zuo
..............
page:1-8
Distributed beamforming in MIMO relay systems with limited feedback
li chun guo ; zhong chong xian ; yang lv xi
..............
page:60-67
Wireless cellular network modeling and service matching based on network calculus
ni rui ; zhou wu ; wei guo
..............
page:33-39
Limited-rate feedback resource allocation algorithm based on MIMO-OFDM for cognitive radio systems
xu lei ; xu da zhuan ; zhang xiao fei
..............
page:96-103
Greedy based sensor set selecting algorithm under correlated log-normal shadowing
zhang xiao ; wang jin long ; wu qi zuo
..............
page:88-95
Over determined blind source separation based on maximum ratio combining
yao jun liang ; yang xiao niu ; li jian dong ; fu wei hong ; li zuo ; zhang zuo
..............
page:9-17
Research of LT code in satellite data broadcasting system
zhu hong peng ; zhang geng xin ; li guang xia
..............
page:122-127,135
Iterative channel estimation and Turbo equalization for FMT systems
zhong hua ; zheng lin hua
..............
page:81-87
Parameterγ tuning for stability of FAST TCP
liang wei ; zhang shun yi ; ning xiang yan ; xu su lei
..............
page:53-59
Signal-subspace-based esprit-like algorithm for coherent DOA estimation
zhang hong shun ; xu yun lin ; zhan jiang shu
..............
page:110-115
Unsupervised anomaly detection method based on improved CURE clustering algorithm
zhou ya jian ; xu chen ; li ji guo
..............
page:18-23,32
Quantitative evaluation of topology intrusion tolerance in wireless sensor networks based on semi-Markov process
xiong shu ming ; wang liang min ; zhan yong zhao
..............
page:24-32