Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2012 Issue 3
Automatic proof of resistance of denial of service attacks in protocols
MENG Bo;HUANG Wei;WAND De-jun;SHAO Fei
..............page:112-121
Novel DOA estimation method for coherent wideband LFM signals
LUO Peng;LIU Kai-hua;YU Jie-xiao;MA Yong-tao
..............page:122-129
Approach for reduced test suite generation based on predicate abstraction
GUO Xi1;ZHANG Huan-guo1;2
..............page:35-43,51
Cloud scheduling algorithm based on fuzzy clustering
LI Wen-juan1;2;ZHANG Qi-fei1;PING Ling-di1;PAN Xue-zeng1
..............page:146-154
Confidential communications technique based on message block precoder in multi-user MIMO systems
ZHU Yao1;2;ZHU Yi-jun1;ZHANG Shui-lian1;LIU Yong-gang2
..............page:155-162
Upper processing gain bound of the spreading signal in multipath fading channels
MA Wan-zhi;WANG Jun;TANG You-xi
..............page:137-145,154
Multi-mobile-beacon assisted distributed node localization scheme
CUI Huan-qing1;2;WANG Ying-long2;GUO Qiang2;LV Jia-liang1;2
..............page:103-111
Cooperative MIMO transmission scheme for clustered ad hoc networks
FENG Wen-jiang;ZHAO Wei;WANG Dong
..............page:1-9
Threshold ring signature for wireless sensor networks
XIAO Jun-fang1;LIAO Jian2;ZENG Gui-hua3
..............page:75-81,89
Robust video watermarking algorithm for H.264/AVC based on texture feature
ZHANG Wei-wei1;2;3;ZHANG Ru1;2;3;LIU Jian-yi1;2;NIU Xin-xin1;2;YANG Yi-xian1;2;Shanghai 201204;China)
..............page:82-89
Adaptive energy-saving routing algorithm for inter-clustering communications in WSN
LI Wen-feng;SHEN Lian-feng;HU Jing
..............page:10-19
S-Vivaldi:a space repairing based Internet delay space embedding algorithm
WANG Zhan-feng;CHEN Ming;XING Chang-you;BAI Hua-li;WEI Xiang-lin
..............page:163-170
Underdetermined blind source separation based on null-space representation and maximum likelihood
WANG Rong-jie1;ZHAN Yi-ju2;ZHOU Hai-feng1
..............page:183-190
Explicit construction of girth-eight QC-LDPC codes and its application in CRT method
ZHANG Guo-hua;SUN Rong;WANG Xin-mei
..............page:171-176
Network traffic classification using decision tree based on minimum partition distance
YANG Zhe1;2;LI Ling-zhi1;2;JI Qi-jin1;2;ZHU Yan-qin1;2
..............page:90-102
Control of the periodical quantum echo of atom bit with arbitrary initial states in two-photon channel
ZHOU Bing-ju;LIU Xiao-juan;ZHAN Jie;ZHOU Ren-long
..............page:177-182
Maximum mean square deviation adaptive filtering algorithm with the same step-size via convex combination
RUI Guo-sheng1;MIAO Jun2;ZHANG Yang2;WANG Lin2
..............page:28-34
Access control security model based on behavior in cloud computing environment
LIN Guo-yuan1;2;3;HE Shan1;HUANG Hao2;WU Ji-yi3;CHEN Wei1
..............page:59-66