Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2013 Issue 10
Efficient low-delay routing algorithm for opportunistic networks based on cross-layer sensing of encountered nodes
REN Zhi;SUO Jian-wei;CHEN Hong;XU Zhong-hao;CHEN Qian-bin;Chongqing Key Laboratory of Mobile Communication Technology;Chongqing University of Posts and Telecommunications;
..............page:1-8
Low duty cycle and low collision asynchronous MAC protocol for wireless sensor network
LI Zhe-tao;ZHU Geng-ming;WANG Zhi-qiang;PEI Ting-rui;PAN Gao-feng;College of Information Engineering;Xiangtan University;School of Computer;National University of Defense Technology;Key Laboratory of Intelligent Computing & Information;Ministry of Education;Xiangtan University;School of Computer Science & Engineering;Hunan University of Science and Technology;School of Computer & Information Science;Southwest University;
..............page:9-16
Secure lossless transmission of correlated sources over noisy broadcast channel using separate source-channel coding
LANG Fei;WANG Bao-yun;DENG Zhi-xiang;College of Communication and Information Engineering;Nanjing University of Posts and Telecommunications;National Mobile Communications Research Laboratory;Southeast University;
..............page:17-27
Interference identification and classification mechanism for wireless sensor network
ZHAO Ze;SHANG Peng-fei;CHEN Hai-ming;LIU Qiang;LI Dong;ZHANG Zhao-liang;CUI Li;Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:28-36
Trustworthy service discovery based on a modified ant colony algorithm
SHENG Guo-jun;WEN Tao;GUO Quan;SONG Xiao-ying;Software Center;Northeastern University;Liaoning Key Lab of Network Security and Computing Technology;Dalian Neusof t Information Institute;
..............page:37-48
Method of detecting IRC Botnet based on the multi-features of traffic flow
YAN Jian-en;YUAN Chun-yang;XU Hai-yan;ZHANG Zhao-xin;School of Computer Science and Technology;Harbin Institute of Technology;National Computer Network Emergency Response Technical Team/Coordination Center of China;
..............page:49-55+64
Joint bandwidth and power allocation algorithm in cognitive radio network with consideration of utility and fairness
YAN Ji-lei;LI Jian-dong;ZHAO Lin-jing;DONG Quan;State Key Laboratory of Integrated Service Networks;Xidian University;
..............page:56-64
SenLeash: a restricted defense mechanism against wormhole attacks in wireless sensor network
HU Rong-hua;DONG Xiao-mei;WANG Da-ling;College of Information Science and Engineering;Northeastern University;
..............page:65-75
Joint quadrature modulation and network coding for cooperative Hybrid-ARQ
SHI Xiao-ye;GE Jian-hua;LI Jing;REN De-feng;State Key Lab of Integrated Service Networks;Xidian University;
..............page:76-83
Outage probability based power allocation and relay selection algorithm in cooperative communication
SUN Li-yue;ZHAO Xiao-hui;GUO Ming;College of Communication Engineering;Jilin University;
..............page:84-91
TD algorithm based on double-layer fuzzy partitioning
MU Xiang;LIU Quan;FU Qi-ming;SUN Hong-kun;ZHOU Xin;Institute of Computer Science and Technology;Soochow University;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;
..............page:92-99
Noncoherent unitary space-time design base on Grassmann manifold
FU Da-wei;PENG Li;WANG Li-jiao;PENG Qiu-ping;Wuhan National Laboratory for Optoelectronics;Department of Electronic and Information Engineering;Huazhong University of Science and Technology;
..............page:100-105
ACS based differentiated service routing algorithm in wireless sensor network
ZHAO Hong;HU Zhi;WEN Ying-you;College of Information Science and Engineering;Northeastern University;Software Centre;Northeastern University;
..............page:106-115
Polarization demultiplexing by ICA in a polarization multiplexing system with both PMD and PDL
ZHAO Ling;HU Gui-jun;LV Jin-hua;LI Gong-yu;LI Li;College of Communication Engineering;Jilin University;
..............page:116-120
Canonical correlation analysis of big data based on cloud model
YANG Jing;LI Wen-ping;ZHANG Jian-pei;College of Computer Science and Technology;Harbin Engineering University;
..............page:121-134
Network protocol identification based on active learning and SVM algorithm
WANG Yi-peng;YUN Xiao-chun;ZHANG Yong-zheng;LI Shu-hao;Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:135-142
Traffic classification model based on fusion of multiple classifiers with flow preference
DONG Shi;DING Wei;School of Computer Science and Engineering;Southeast University;Key Laboratory of Computer Network and Information Integration;Ministry of Educations;Southeast University;School of Computer Science and Technology;Zhoukou Normal University;
..............page:143-152
Design and implementation of a novel general format multimedia digital rights management system
HUANG Qin-long;MA Zhao-feng;MO Jia;NIU Xin-xin;YANG Yi-xian;Information Security Center;Beijing University of Posts and Telecommunications;Beijing National Security Science and Technology Co.;Ltd;School of Computer Science and Engineering;University of Electronic Science and Technology of China;
..............page:153-161
Protocol format extraction at semantic level
PAN Fan;HONG Zheng;ZHOU Zhen-ji;WU Li-fa;College of Command Information System;PLA University of Science and Technology;
..............page:162-173
Channel estimation based on compressive sensing in two-way amplify-and-forward relay channel
WEI Hao;ZHENG Bao-yu;HOU Xiao-yun;ZHU Yan;Institute of Signal Processing and Transmission;Nanjing University of Posts and Telecommunications;National Mobile Communications Research Laboratory;Southeast University;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:174-182
States constrain-based algorithm for large scale regular expression matching
HE Wei;GUO Yun-fei;HU Hong-chao;National Digital Switching System Engineering Technological R&D Center;
..............page:183-190
chuang xin ji shu xue shu zhuan zhu
..............page:191