Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 6
Ant colony routing strategy based on distribution uniformity degree for content centric network
ZHANG Guo-yin;TANG Bin;SUN Jian-guo;LI Jia-nan;College Computer Science & Technology;Harbin Engineering University;
..............page:5-16
Time series data aggregation algorithm with synchronous prediction for WBAN
WANG Ru-yan;ZHAI Mei-ling;WU Da-peng;Broadband Ubiquitous Network Research Laboratory;Chongqing University of Posts and Telecommunications;
..............page:17-25
Cooperative sensing method considering malicious nodes in cognitive radio networks
QI Xiao-gang;ZHENG Sheng-yu;LIU Li-fang;WANG Hui-fang;School of Mathematics and Statistics;Xidian University;School of Computer Science and Technology;Xidian University;
..............page:26-34
Active measurement mechanism measuring SDN performances
CHEN Ming;DAI Fei;XU Bo;XING Chang-you;LI Bing;ZHANG Guo-min;College of Command Information Systems;PLA University of Science and Technology;
..............page:35-44
High-throughput and low-overhead probabilistic routing based on multi-player bargaining game for opportunistic networks
REN Zhi;SUO Jian-wei;LIU Wen-peng;LEI Hong-jiang;CHEN Qian-bin;Chongqing Key Laboratory of Mobile Communication Technology;Chongqing University of Posts and Telecommunications;
..............page:45-52
Web services QoS prediction via matrix completion with structural noise
CHEN Lei;YANG Geng;CHEN Zheng-yu;XIAO Fu;XU Jian;School of Computer;Nanjing University of Posts and Telecommunications;Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education;Nanjing University of Post and Telecommunications;
..............page:53-63
Cryptanalysis of novel extended multivariate public key cryptosystem
NIE Xu-yun;LIU Bo;LU Gang;ZHONG Ting;School of Information and Software Engineering;University of Electronic Science and Technology of China;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;School of Computer Science and Engineering;University of Electronic Science and Technology of China;
..............page:64-69
ONSA: optimal non-uniformly statistic-source anonymity protocol in WSN
NIU Xiao-guang;WEI Chuan-bo;FENG Wei-jiang;PENG Guo-jun;ZHANG Huan-guo;School of Computer Science;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing MOE;Wuhan University;School of Computer Science;National University of Defense Technology;
..............page:70-81
Optimization method through topology reconfiguration for mobile underwater wireless sensor networks
HE Ming;LIANG Wen-hui;CHEN Qiu-li;CHEN Xi-liang;CHEN Jian;College of Command Information System;PLA Science and Technology University;The 61th Research Institute of PLA;61345 Armies;
..............page:82-91
High efficiency differential chaos shift keying modulation scheme without intra-signal interference
YANG Hua;JIANG Guo-ping;DUAN Jun-yi;Key Laboratory of Radio Frequency and Micro-Nano Electronics of Jiangsu Province;Nanjing University of Posts and Telecommunications;School of Electronic Science and Engineering;Nanjing University of Posts and Telecommunications;School of Automation;Nanjing University of Posts and Telecommunications;
..............page:92-97
Optimized coverage algorithm of wireless video sensor network based on quantum genetic algorithm
FAN Fu-you;YANG Guo-wu;LE Qian-qi;LV Feng-mao;ZHAO Chao;School of Computer Science and Engineering;University of Electronic Science and Technology of China;School of Computer and Information Engineering;Yibin University;
..............page:98-108
Diversity of controllable anonymous communication system
ZHOU Yan-wei;WU Zhen-qiang;YANG Bo;School of Computer Science;Shaanxi Normal University;
..............page:109-119
Multi-authority attribute-based encryption access control model for cloud storage
GUAN Zhi-tao;YANG Ting-ting;XU Ru-zhi;WANG Zhu-xiao;School of Control and Computer Engineering;North China Electric Power University;
..............page:120-130
Fundamental performance bounds for multi-performance criteria in wireless ad hoc networks
WANG Qi;Katia Jaffrès-Runser;SUN Yi;LI Jun;ZHANG Jun;DA Bin;LI Zhong-cheng;Institute of Computing Technology;Chinese Academy of Sciences;School of Computer and Control Engineering;University of Chinese Academy of Sciences;University of Toulouse;IRIT / ENSEEIHT;College of Computer Science;Inner Mongolia University;Ricoh Software Research Center;
..............page:131-142
Multi-party controlled quantum communication protocol
CHANG Li-wei;ZHENG Shi-hui;GU Li-ze;LEI Min;YANG Yi-xian;Information Security Research Center;Beijing University of Posts and Telecommunications;National Engineering Laboratory for Disaster Backup and Recovery;Beijing University of Posts and Telecommunications;
..............page:143-152
Simple constellation shaping for BICM-ID
LI Qi;ZHOU Lin;ZHANG Bo;BAI Bao-ming;State Key Laboratory of Integrated Services Networks;Xidian University;School of Information Science and Engineering;Huaqiao University;No. 96401 Troop;Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory;
..............page:153-160
Recent development and its prospect of satellite communications
YI Ke-chu;LI Yi;SUN Chen-hua;NAN Chun-guo;School of Telecommunication Engneering;Xidian University;The 54-th Research Institute of China Electronics Technology Group Corporation;
..............page:161-176
Caching strategy based on node’s importance to community in information-centric networks
CAI Jun;YU Shun-zheng;LIU Wai-xi;School of Electronic and Information;Guangdong Polytechnic Normal University;Department of Electronics and Communication Engineering;Sun Yat-Sen University;Department of Electronic and Information Engineering;Guangzhou University;
..............page:177-186
Algorithm for the cloud service workflow scheduling with setup time and deadline constraints
SHEN Hong;LI Xiao-ping;School of Computer Science &Engineering;Southeast University;Jinshen College;Nanjing Audit University;
..............page:187-196
Collaborative filtering recommendation algorithm based on one-jump trust model
WANG Xing-mao;ZHANG Xing-ming;WU Jiang-xing;National Digital Switching System Engineering and Technological R&D Center;
..............page:197-204
Iterative estimation method for random interleaver of Turbo codes
LIU Jun;LI Jing;YU Pei-dong;Information System College;PLA Information Engineering University;
..............page:205-210