Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2013 Issue 1
Anomaly detection system with hole coverage optimization based on negative selection algorithm
LU Tian-liang1;ZHENG Kang-feng1;FU Rong-rong2;YANG Yi-xian1;WU Bin1;GUO Shi-ze1
..............page:128-135
Blind detection for image steganography using short duplicate codes statistical model for Hilbert scanning sequences
ZHONG Shang-ping;XU Qiao-fen;GUO Wen-zhong;LIAO Bin
..............page:51-60
Traffic measurement algorithm based on least recent used and Bloom filter
ZHANG Zhen;WANG Bin-qiang;ZHANG Feng-yu;LIANG Ning-ning
..............page:111-120
Cooperative spectrum sensing detector based on generalized eigenvalue
JIN Ming1;LI You-ming1;GAO Yang2
..............page:105-110,120
MVDR beamforming for correlated signal with vector smoothing
LIN Zhi-yong;TAO Jian-wu
..............page:96-104
Novel blind recognition method for self-synchronized scrambler
LIAO Hong-shu;YUAN Ye;GAN Lu
..............page:136-143
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
SUN Mao-hua1;2;LUO Shou-shan1;2;3;XIN Yang1;2;YANG Yi-xian1;2
..............page:30-42
Survey of negative selection algorithms
JIN Zhang-zan1;LIAO Ming-hong2;XIAO Gang3
..............page:159-170
Security in cognitive radio networks
PEI Qing-qi1;LI Hong-ning2;ZHAO Hong-yang1;LI Nan1;MIN Ying1
..............page:144-158
On one class of symmetric Boolean functions
OU Zhi-hui1;ZHAO Ya-qun1;2
..............page:89-95,104
Approximation algorithm to symmetric alpha stable distribution with bi-region curve model
WANG Kang1;2;XU Zhi-jiang3;MENG Li-min3
..............page:178-184
Spatio-temporal periodic behavior mining algorithm for social networks
HU Yu-peng1;2;LUO Hao1;LIN Ya-ping1;QIN Zheng1;YIN Bo1
..............page:8-18
Gradient descent Sarsa(λ) algorithm based on the adaptive potential function shaping reward mechanism
XIAO Fei1;LIU Quan1;2;FU Qi-ming1;SUN Hong-kun1;GAO Long1
..............page:77-88
Effect of UDP traffic on TCP’s round-trip delay
ZHU Hai-ting;DING Wei;MIAO Li-hua;GONG Jian
..............page:19-29
Fast motion estimation based on the special and temporal characteristic
LIU Long1;2;SONG Qi-jun3;ZHAO Tai-fei1;YUAN Xiang-hui2
..............page:121-127
Multi-cell downlink coordinated beam forming algorithm based on fairness duality theory
HE Shi-wen1;2;HUANG Yong-ming1;2;YANG Lv-xi1;2
..............page:69-76
Host’s source address verification based on stream authentication in the IPv6 access subnet
CHEN Yue;JIA Hong-yong;TAN Peng-xu;SHAO Jing
..............page:171-177
Impact of user behavior on network performance reliability
ZHAO Juan1;2;GUO Ping1;DENG Hong-zhong2;WU Jun2;TAN Yue-jin2;ZHANG Min1
..............page:43-50