Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2013 Issue 2
Data compression method for wireless sensor networks based on adaptive optimal zero suppression
JIANG Peng1;WU Jian-feng1;2;WU Bin1;DONG Lin-xi3;WANG Da3
..............page:1-7
Low complexity linear parallel detection algorithm for near ML detection of MIMO systems
RUI Guo-sheng;ZHANG Hai-bo;ZHANG Yang;TIAN Wen-biao;ZHANG Song;LI Ting-jun
..............page:8-14
Optimizing path selection of mobile Sink nodes in mobility-assistant WSN
ZHANG Xi-wei1;SHEN Lin2;JIANG Yi-feng2
..............page:85-93
Dynamic software watermarking algorithm based on memory operation
XU Jin-chao1;2;ZENG Guo-sun1;2
..............page:128-137
Cloud sourcing domain name resolving service model
QIN Zhen1;XIAO Chun-jing2;LI Le-min1
..............page:15-22
Review on learning mobile user preferences for mobile network services
MENG Xiang-wu1;2;SHI Yan-cui1;2;WANG Li-cai1;2;ZHANG Yu-jie1;2
..............page:147-155
Forgery attacks on two identity based signature schemes
CHEN Liang1;2;CUI Yong-quan1;TIAN Miao-miao3;FU Xiao-qing1;XU Peng1
..............page:123-127
Timer based algorithm for minimum connected dominating set construction
YANG Yang;RUI Lan-lan;GUO Shao-yong;QIU Xue-song;QI Feng
..............page:100-108
Multi-user bandwidth allocation method based on traffic cognition
ZHANG Yao-dong;WANG Yue;HUO Jin-hai;YUAN Jian
..............page:109-116
Development and prospect of research on femtocell in two-tier heterogeneous networks
XIAO Zhu1;2;LI Ren-fa1;YI Ke-chu2;ZHANG Jie3
..............page:156-169
Strongly secure certificateless signature scheme without pairings
WANG Ya-fei1;ZHANG Rui-zhe2
..............page:94-99,108
On the average diameter of directed loop networks
CHEN Ye-bin1;LI Ying2;ZHENG Xiao1;CHEN Tao1
..............page:138-146
Trust based secure routing model for cognitive radio networks
ZHANG Guang-hua1;2;ZHANG Yu-qing1;3;LIU Xue-feng1;3
..............page:56-64
UC model of secure positioning protocols
ZHANG Jun-wei;MA Jian-feng;YANG Chao
..............page:117-122
Public-key encryption scheme based on R-LWE
YANG Xiao-yuan1;2;WU Li-qiang1;ZHANG Min-qing1;ZHANG Wei1
..............page:23-30
Power control algorithm for wireless sensor networks based on approximate Unit Delaunay triangulation
XU Peng-fei1;3;CHEN Zhi-gang2;DENG Xiao-heng2
..............page:170-176
Novel joint encoding/decoding algorithms of LT codes based on random permute egde-growth and stopping set
JIAO Jian;YANG Zhi-hua;GU Shu-shi;ZHOU Jie;ZHANG Qin-yu
..............page:31-39