Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2012 Issue 12
Random finite sets based UPF-CPHD multi-object tracking
WANG Hui-bin;CHEN Zhe;WANG Xin;MA Yu
..............page:147-153
On-demand key management based on social attribute for opportunistic networks
CHEN Xi1;2;LI Guang-song3;TIAN You-liang1;MA Jian-feng1;Xidian University;Xi’an 710071;China;2.The Twentieth Research Institute of China Electronics Technology Group Corporation;Xi’an 710068;China;3.Department of Information Research;PLA Information Engineering University;Zhengzhou 450002;China)
..............page:93-99
Study of equivalent point-to-point transmission model for coded relay cooperations
ZHANG Qiu-xia1;2;YANG Feng-fan1;2;ZHANG Shun-wai1;2;LUO Lin1;2
..............page:100-107
Research on P2P streaming media identification based on UDP
DONG Shi1;2;3;4;WANG Gang2;3;4
..............page:25-34
Weighted cooperative spectrum sensing algorithm based on dempster-shafer evidence theory
ZHOU Ya-jian1;3;LIU Kai2;XIAO Lin2
..............page:19-24
Improved pulse shaping for PAPR reduction of OFDM signal
FENG Zhuo-ming;LIU Wei-zhong;TAO Xiong-fei;LUO Bai-yun
..............page:154-160
Performance analysis of zero-forcing coordinated MIMO transmission in interference channels
WANG Hai-rong1;DONG Jian2;HUANG Yong-ming1;YANG LV-xi1
..............page:69-78
Non-invasive eye tracking technology based on corneal reflex
GAOGAO Di;YIN Gui-sheng;MA Chun-guang
..............page:133-139
Novel method for angle estimating of bistatic MIMO radar
ZHENG Zhi-dong1;ZHANG Jian-yun1;QU Jin-you2;LIN Xiu-qing1
..............page:123-132
Collaborative defending scheme against malicious Web pages based on social trust
LIU Xin1;3;JIA Chun-fu2;3;LIU Guo-you2;HU Zhi-chao2;WANG Dong2
..............page:11-18
Enhanced binary Spray and Wait scheme based on reputation for DTN
ZHANG Xi;WANG Xiao-fei;ZHANG Quan;TANG Chao-jing
..............page:79-84
Histogram affine invariants extraction method based on two-scale auto-convolution
HUANG Bo1;2;ZHAO Xiao-hui1;CAO Xin-yan1;3;ZHAO Ji-yin1;SHI Gong-tao2
..............page:140-146
Novel kernel function for computing the similarity of text
WANG Xiu-hong1;2;3;JU Shi-guang4
..............page:43-48
Research on the time-varying charging and dynamic data routing strategy for rechargeable wireless sensor networks
HAN Jiang-hong1;2;DING Xu1;2;SHI Lei1;2;HAN Dong3;WEI Zhen-chun1;2
..............page:1-10
Provably secure private key protection scheme for smart mobile terminal
MA Jun1;2;MA Jian-feng1;GUO Yuan-bo2;Xidian University;Xi’an 710071;China;2.Institute of Electronic Technique;PLA Information Engineering University;Zhengzhou 450004;China)
..............page:108-115
Efficient conditional aggregation of encrypted data in tiered sensor networks
LI Rui;LIN Ya-ping;LI Jin-guo
..............page:58-68
Constrained collective self-assembly model based on collision delay strategy
DOU Quan-sheng1;2;3;AN Wen1;JIANG Ping1;SHI Zhong-zhi3
..............page:49-57
EAEBHCM: an extended attribute encryption based hidden credentials model
GE Wei-jin;HU Xiao-hui
..............page:85-92
Research on adaptive rate control algorithm for H.264 based on R-Q model
ZHENG Xin-zi;LUO Bing-qing;SUN Zhi-xin
..............page:35-42
Design of dynamic output feedback controller for lurie networked control systems with multiple delays
CHEN Gang1;2;ZHU Hong-qiu1;YANG Chun-hua1;HU Chun-hua3
..............page:116-122