Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing University of Posts and Telecommunications
1007-5321
2009 Issue 1
A Pipeline Leakage Diagnosis for Fusing Neural Network and Evidence Theory
CHEN Bin;WAN Jiang-wen;WU Yin-feng;QIN Nan
..............page:5-9
Trust-Management Framework in Open Network
LUO Xin;YANG Yi-xian;HU Zheng-ming;SU Zhi-yuan
..............page:126-130
High Spectral Efficient Bi-Directional Successive Relaying Techniques
YANG Bo;YU Hong-yi;L Ling;FENG Qiang
..............page:10-13,28
A Network Coding-Aware Routing Protocol in Wireless Mesh Network
QIN Tuan-fa;LIAO Su-yun;LUO Hui-ping;LIANG Zhi-yi
..............page:14-18
A Method of Path Selection for MPLS Traffic Engineering to Minimize Preemption
HE Xiao-ming;TANG Hong;YE Wu
..............page:19-23
A Data Aggregation Strategy Based on Confidence Interval in Wireless Sensor Networks
XU Xiao-feng;WAN Jiang-wen;FENG Ren-jian
..............page:29-33
New Method of High-Level Test Synthesis
SUN Qiang;MA Guang-sheng
..............page:34-38
An Adaptive Bandwidth Allocation Mechanism and Performance Analysis in Cognitive Radio Networks
ZENG Zhi-min;LIU Qi;FENG Chun-yan;GUO Cai-li
..............page:39-42,51
Estimation of Direction-of-Arrival of Cyclostationary Signals in Multipath Propagation Environments
GUO Yan;LIU Xue-liang;LI Ning;WANG Jin-long
..............page:43-46
A Privacy-Preserving Triangle Inequality Determination Protocol and Its Applications
LUO Shoushan;LIAO Gancai;LIU Wen
..............page:47-51
Study of Punctured Binary Sequence Pair with Two-Level Autocorrelation
SHI Jiong;JIANG Ting;ZHOU Zheng
..............page:52-55,94
The Receding Horizon Optimal Control Based on Neural Network
REN Huai-qing;LIANG Yan-chun;SUN Liang
..............page:56-59
Privacy Preserving Self-Certified Signcryption Scheme in Trusted Modules
ZHANG Ming-wu;YANG Bo;ZHU Sheng-lin
..............page:60-64
Network Flow Identification Based on Machine Learning
MA Yong-li;QIAN Zong-jue;SHOU Guo-chu;HU Yi-hong
..............page:65-68
Dynamic Spectrum Sharing Strategy in Cognitive Radio Systems
QIU Jing;ZHOU Zheng
..............page:69-72
A Power Control Algorithm with Faster Convergence for Cognitive Radio
ZHAO Cheng-lin;LI Peng;JIANG Ting
..............page:73-76
Highly Nonlinear Cubic Homogenous Plateaued Functions
ZHANG Feng-rong;XIE Min;MA Hua;HU Yu-pu
..............page:81-84
Distributed Target Tracking Algorithm for Wireless Mobile Sensor Networks
HAN Ping;LI Fang-min;LUO Ting
..............page:90-94
Multiuser Diversity in Decode-and-Forward Cooperative Relay Networks
CHEN Shu-ping;WANG Wen-bo;ZHANG Xing
..............page:95-98,107
Protocol for Privacy Preserving Set Pattern Matching with Unconditionally Secure
ZHENG Qiang;LUO Shoushan;XIN Yang;GU Yonghao
..............page:99-102
Implementation of Fountain Codes Using Logistic Map
HUANG Cheng;YI Ben-shun
..............page:103-107
A Dynamic Spectrum Access Algorithm Based on Probability Density Estimation in Cognitive Radio
HE Xin-ying;ZENG Zhi-min;GUO Cai-li
..............page:108-112
Application of Graph Theory in Threat Situation Analysis of Network Security
CHEN Tian-ping;QIAO Xiang-dong;ZHENG Lian-qing;LUO Yun-qian
..............page:113-117
Time Synchronization Algorithm for MIMO OFDM Systems
ZHANG Jian-hua;FENG Chong;LIU Yi;ZHANG Yan-yan
..............page:118-121