Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2012 Issue 10
Vehicular ad hoc network and clustering routing algorithm applied in wilderness scenarios
MOHAMED Mohsen;XU Kai-kai;XIA Wei-wei;WU Yi;SHEN Lian-feng
..............page:166-174
Energy constraint Bayesian compressive sensing detection algorithm
ZHAO Chun-hui;XU Yun-long
..............page:1-6
Adaptive transmission scheme of generalized multi-carrier system based on orthogonal transformation
TIAN Pan1;LI Ming-qi2;RUI Yun2;ZHENG Min1;BU Zhi-yong1
..............page:91-100
Pair-wise key establishment for wireless sensor networks based on fully homomorphic encryption
ZHANG Yong1; WEN Tao1;2; GUO Quan2; LI Feng-kun2
..............page:101-109
Analysis of the success probability of cube attack
SONG Hai-xin1;2;FAN Xiu-bin1;WU Chuan-kun1;FENG Deng-guo1
..............page:143-148
shi liang di tu shu zi shui yin ji shu yan jiu
sun jian guo
..............page:192
Hurst and priority adaptive RED combined with dynamic scheduling algorithm based on AOS
BIE Yu-xia1;2;PAN Cheng-sheng1;3;LIU Hai-yan2;3;WANG Yan-chun1;3
..............page:156-165
Data aggregation based on the privacy-preserving element in wireless sensor networks
ZENG Wei-ni1;2;LIN Ya-ping2;HE Shi-ming2;YU Jian-ping3
..............page:16-25
Joint source-channel coding for image transmission based on best wavelet packet
CHEN Jun-hong;ZHANG Qin-yu
..............page:149-155,165
New slot management scheme supporting ONU sleep mode
ZHANG Yin-fa1;JIA Lei2;YANG Jian1;LIU Tao1
..............page:175-182
Secrecy capacity analysis of MISO system with artificial noise
JI Jiang;JIN Liang;HUANG Kai-zhi
..............page:138-142
Power allocation under per-antenna power constraints in multiuser MIMO systems
HAN Sheng-qian;YANG Chen-yang
..............page:71-76,85
Secure and transparent data aggregation for wireless sensor networks
GUO Jiang-hong;MA Jian-feng
..............page:51-59,70
Research on enhanced channel assignment scheme in wireless mesh network
FENG Lin-han;QIAN Zhi-hong;JIN Dong-cheng
..............page:44-50
Dynamic adaptive trust evaluation model based on interaction-aware
LI Feng1;2;SHEN Li-min1;3;SI Ya-li1;NIU Jing-chun1
..............page:60-70
Using random subcarrier weighting for multi-carrier systems physical layer security
ZHONG Zhou;JIN Liang;HUANG Kai-zhi
..............page:86-90,100
Reconfigurable buffer mechanism in switch fabric design
HUANG Hui-qun1;2;LIU Qin-rang1;2;BU You-jun1;2;ZHANG Feng-yu1;2
..............page:126-131
Approach to deep Web data acquiring based on circular strategy and dynamic knowledge
XIAN Xue-feng1;2;CUI Zhi-ming1;2;ZHAO Peng-peng1;2;LIANG Yin-hong2;3;FANG Li-gang2;3
..............page:35-43
Pre-distribution asymmetric key management scheme for mobile ad hoc networks
HAN Lei1;LIU Ji-qiang2;HAN Zhen2;WEI Xue-ye1
..............page:26-34
Time-domain analysis of adaptive interference cancellation system with the desired signal
LI Wen-lu;ZHAO Zhi-hua;LI Yi;TANG Jian;XIAO Huan
..............page:183-190
Improvement of distributed timestamp synchronization
LIN Kai1;JIA Chun-fu1;SHI Le-yi2
..............page:110-116