Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2014 Issue 8
Authentication method in SWIM based on improved Diameter/EAP-MD5
WU Zhi-jun;ZHAO Ting;LEI Jin;Tianjin Key laboratory for Advanced Signal Processing;Civil Aviation University of China;
..............page:1-7
High efficient shape coding based on the representation of contour and chain code
ZHU Zhong-jie;WANG Yu-er;JIANG Gang-yi;Ningbo Key Lab. of DSP;Zhejiang Wanli University;Institute of Technology;Ningbo University;
..............page:8-14
Predicting users’ profiles in social network based on semi-supervised learning
DING Yu-xin;XIAO Xiao;WU Mei-jing;ZHANG Yi-bin;DONG Li;Shenzhen Graduate School;Harbin Institute of Technology;State Key Laboratory of Computer Architecture;Institute of Computing Technology;
..............page:15-22
Privacy-perserving scheme for social networks
LV Zhi-quan;HONG Cheng;ZHANG Min;FENG Deng-guo;CHEN Kai-qu;TCA Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;National Supercomputing Center in Shenzhen;
..............page:23-32
Adaptive compressed spectrum sensing based on optimized measurement matrix
WANG Wei-gang;YANG Zhen;GU Bin;HU Hai-feng;Key Laboratory of Wideband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;College of Electronic Science and Engineering;Nanjing University of Posts and Telecommunications;National Mobile Communications Research Laboratory;Southeast University;
..............page:33-39
Semi-supervised learning by constructing query-document heterogeneous information network
LIU Yu-feng;LI Ren-fa;School of Information Science and Engineering;Hunan University;Embedded System and Networking Laboratory;Hunan University;
..............page:40-47
Non-orthogonal multiple-access system SC-FDMA-IDMA with iterative block equalization
LIU De-liang;HUANG Qiang;XU Da-zhuan;Institute of Communication Engineering;PLA University of Science and Technology;Institute of Information Science and Technology;Nanjing University of Aeronautics and Astronautics;CETC 28;
..............page:48-55
Optimized algorithm for value iteration based on topological sequence backups
HUANG Wei;LIU Quan;SUN Hong-kun;FU Qi-ming;ZHOU Xiao-ke;School of Computer Science and Technology;Soochow University;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;
..............page:56-62
Research on optimal parallel routing and wide diameter of unidirectional double-loop networks
LIU Hui;ZHANG Zhen;FANG Mu-yun;ZHENG Xiao;CHEN Ye-bin;Department of Computer Science;Anhui University of Technology;
..............page:63-70
Fused access control scheme for sensitive data sharing
YAN Xi-xi;GENG Tao;School of Computer Science and Technology;Henan Polytechnic University;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:71-77
Malware detection technology analysis and applied research of android platform
WEN Wei-ping;MEI Rui;NING Ge;WANG Liang-liang;Department of Information Security;School of Software and Microelectronics;Peking University;
..............page:78-85+94
DTW-based multi-wavelet data compression algorithm for wireless sensor networks
ZHOU Si-wang;LI Lan;College of Computer Science and Electronic Engineering;Hunan University;
..............page:86-94
Research of platform identity attestation based on trusted chip
ZHANG Qian-ying;FENG Deng-guo;ZHAO Shi-jun;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:95-106
Survivability evaluation of network information system based on the cloud model and analytic hierarchy process
LIU Yan-hua;CHEN Guo-long;WU Rui-fen;College of Mathematics and Computer Science;Fuzhou University;Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing;
..............page:107-115
LBS-oriented location privacy protection model and scheme
YANG Song-tao;MA Chun-guang;ZHOU Chang-li;College of Computer Science and Technology;Harbin Engineering University;College of Information and Electronic Technology;Jiamusi University;College of National Secrecy;Harbin Engineering University;
..............page:116-124
Research on malicious code variants detection based on texture fingerprint
HAN Xiao-guang;QU Wu;YAO Xuan-xia;GUO Chang-you;ZHOU Fang;School of Computer&Communication Engineer;University of Science&Technology Beijing;Core Research Institute;Beijing Venustech Cybervision Co. Ltd.;Department of Computer Science and Technology;Tsinghua University;
..............page:125-136
Multi-core helper thread prefetching for irregular data intensive applications
ZHANG Jian-xun;GU Zhi-min;HU Xiao-han;CAI Min;School of Computer Science and Technology;Beijing Institute of Technology;Network Center;Tianjin University of Traditional Chinese Medicine;
..............page:137-146
Method to improve the performance of network time delay of EPA system
LIU Ning;ZHONG Chong-quan;LIN Yao-yao;School of Mechanical and Power Engineering;Henan Polytechnic University;School of Control Science and Engineering;Dalian University of Technology;
..............page:147-153
Semi-Markov decision process based congestion control algorithm for video transmission
TIAN Bo;YANG Yi-min;CAI Shu-ting;School of Automation;Guangdong University of Technology;
..............page:154-161
Low-power TCAM for regular expression matching
DING Lin-xuan;HUANG Kun;ZHANG Da-fang;College of Computer Science and Electronic Engineering;Hunan University;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:162-168+178
Effective retransmission in network coding for TCP
CHEN Jing;SONG Xue-peng;LIU Fang;Information Center of Ministry of Science and Technology;Computer Network Information Center;Chinese Academy of Sciences;
..............page:169-178
Equivalent characterization of resilient rotation symmetric functions with q number of variables over GF(p)
DU Jiao;PANG Shan-qi;WEN Qiao-yan;ZHANG Jie;College of Mathematics and Information Science;Henan Normal University;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;School of Science;Beijing University of Posts and Telecommunications;
..............page:179-183
Survey of research on future network architectures
HUANG Tao;LIU Jiang;HUO Ru;WEI Liang;LIU Yun-jie;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:184-197
Research of cross-tier cooperative transmission technology in heterogeneous network
ZHANG Chen;SU Xin;WANG Wen-qing;ZENG Jie;KUANG Yu-jun;Mobile Link Laboratory;University of Electronic Science and Technology of China;Research Institute of Information Technology;Tsinghua National Laboratory for Information Science and Technology;Tsinghua University;Datang Mobile Communications Equipment Co.;LTD;
..............page:198-205
HPEngine: high performance XACML policy evaluation engine based on statistical analysis
NIU De-hua;MA Jian-feng;MA Zhuo;LI Chen-nan;WANG Lei;School of Computer Science and Technology;Xidian University;
..............page:206-215
Provably secure and efficient proxy signature scheme
ZENG Jie;NIE Wei;College of Information Engineering;Shenzhen University;Shenzhen Modern Communication and Information Processing Key Lab;
..............page:216-222