Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 4
Based on improved malthusian model microblogging topic trend forecast
HE Yan-xiang;LIU Jian-bo;LIU Nan;PENG Min;CHEN Qiang;HE Jing;Computer School;Wuhan University;State Key Lab of Software Engineering;Wuhan University;Department of Quartermaster;Military Economic Academy;Kennesaw State University;
..............page:5-12
Local congestion control algorithm with fair channel allocation
ZHU Geng-ming;WANG Zhi-qiang;LI Zhe-tao;LI Ren-fa;School of Computer Science & Engineering;Hunan University of Science and Technology;College of Information Engineering;Xiangtan University;School of Computer;National University of Defense Technology;School of Information Science & Engineering;Hunan University;
..............page:13-22
Two-level feature selection method based on SVM for intrusion detection
WU Xiao-nian;PENG Xiao-jin;YANG Yu-yang;FANG Kun;School of Communication and Information;Guilin University of Electronic Technology;Guangxi Wireless Broadband Communication and Signal Processing Key Laboratory;Guilin University of Electronic Technology;Guangxi Experiment Center of Information Science;Guilin University of Electronic Technology;
..............page:23-30
Improved spectral clustering algorithm and its application in MCI detection
XIANG Jie;ZHAO Dong-qin;College of Computer Science and Technology;Taiyuan University of Technology;Center of Experimental and Teaching;Shanxi University of Finance and Economics;
..............page:31-38
Bypass node non-redundant adding algorithm for crossing-level data transmission in two-dimension reconfigurable cell array
CHEN Nai-jin;FENG Zhi-yong;JIANG Jian-hui;School of Computer Science and Technology;Tianjin University;School of Computer and Information Engineering;Anhui Polytechnic University;School of Software Engineering;Tongji University;
..............page:39-55
Adaptive co-site interference cancellation algorithm with multiple virtual references
XIE Yue-lei;LIU Jie;LI Min-zheng;OUYANG Shan;LIAO Gui-sheng;School of Information and Communication;Guilin University of Electronic Technology;National Lab of Radar Signal Processing;Xidian University;
..............page:56-61
Route optimization scheme for nested mobile networks based on extending neighbor discovery protocol
YIN Xing;WU Guo-xin;DONG Yong-qiang;ZHANG San-feng;School of Computer Science and Engineering;Southeast University;School of Electrical and Information Engineering;Jiangsu University;
..............page:62-73
Adaptive node scheduling algorithm for target tracking in wireless sensor networks
LU Xu;CHENG Liang-lun;LUO Shi-liang;College of Automatization;Guangdong University of Technology;College of Automatization;Guangdong Polytechnic Normal University;
..............page:74-84
Virtual network embedding approach to survive multiple node failures
XIAO Ai-ling;WANG Ying;MENG Luo-ming;QIU Xue-song;LI Wen-jing;State Key Laboratory of Networking and Switching;Beijing University of Posts and Telecommunications;
..............page:85-92
Load balancing multicast routing based on network coding in wireless mesh network
SHEN Xiao-jian;CHEN Zhi-gang;LIU Li;College of Information Science and Engineering;Central South University;College of Computer and Communication;Hunan University of Technology;
..............page:93-99
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
XIE Jing;ZHANG Jian-pei;YANG Jing;ZHANG Bing;College of Computer Science and Technology;Harbin Engineering University;
..............page:100-108
Perspective invariant binary feature descriptor based image matching algorithm
GENG Li-chuan;SU Song-zhi;LI Shao-zi;College of Information Science and Technology;Xiamen University;Fujian Key Laboratory of the Brain-like Intelligent Systems;
..............page:109-118
Spatial spectrum based blind spectrum sensing for multi-antenna cognitive radio system
LIU Chang;Syed Sajjad Ali;ZHANG Rui;LI Si-ying;WANG Jie;JIN Ming-lu;School of Information and Communication Engineering;Dalian University of Technology;
..............page:119-128
Research of LBS privacy preserving based on sensitive location diversity
ZHOU Chang-li;MA Chun-guang;YANG Song-tao;School of Computer Science and Technology;Harbin Engineering University;
..............page:129-140
Effective fault localization technique using parameter-value replacement
WANG Xing-ya;JIANG Shu-juan;JU Xiao-lin;CAO He-ling;School of Computer Science and Technology;China University of Mining and Technology;School of Computer Science and Technology;Nantong University;
..............page:141-149
Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext
WU Yang;WANG Tao;XING Meng;LI Jin-dong;Dept. of Information Engineering;Ordnance Engineering College;
..............page:150-159
Single-channel blind separation of co-frequency modulated signals based on Gibbs sampler
YANG Yong;ZHANG Dong-ling;PENG Hua;TU Shi-long;Institute of Information System Engineering;PLA Information Engineering University;National Key Laboratory on Blind Signals Processing;
..............page:160-166
Companding transform technique combined with iterative filtering for reducing PAPR of OFDM signals
YANG Chao;WANG Yong;GE Jian-hua;State Key Lab. of Integrated Service Networks;Xidian University;
..............page:167-173
Modified SLM algorithm based on cyclic shift and signal combination in MIMO-OFDM system
HU Wu-jun;YANG Lin;National Key Laboratory of Science and Technology on Communications;University of Electronic Science and Technology of China;
..............page:174-181
Improved method for local image feature region description
ZHU Ren-huan;GAO Qing-wei;LU Yi-xiang;SUN Dong;College of Electrical Engineering and Automation;Anhui University;
..............page:182-188
Certificateless signature scheme without random oracles
LI Yan-qiong;LI Ji-guo;ZHANG Yi-chen;College of Computer & Information;Hohai University;
..............page:189-198