Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecommunications Science
1000-0801
2015 Issue 12
Third Way for Future Network
Li Youping;
..............page:1-5
An Incremental Deployment Approach from the Internet to CoLoR
Hu Mengchun;,Wang Zhaoxu;,Luo Hongbin;,Chen Gong;
..............page:6-19
A Reconfigurable and Evolvable Platform for Network Function Innovation
Zhang Jianhui;,Duan Tong;,Zhang Xiaohui;,Hu Yuxiang;
..............page:20-27
MCKite: A Multi-Producer Multicast Scheme in Named Data Networking
Zhang Yu;,Sun Yanbin;,Zhang Hongli;
..............page:28-33
A Temperature Field Based Routing Algorithm in Content-Centric Networking
Liu Zonghai;,Wang Peng;,Zhang Xiaohui;,Jin Feicai;
..............page:34-41
Key Technologies in Physical Layer of 5G Wireless Communications Network
Ni Shanjin;,Zhao Junhui;
..............page:42-47
Network Topology Reconstruction Based on Power Line Communication
Ma Xu;,Yang Fang;,Song Jian;,Li Jianqi;,Liu Weilin;
..............page:48-53
Cell Selection Algorithm for Edge Users in Heterogeneous Wireless Network
Zhao Zhendong;,Niu Weijiao;,Han Dongsheng;,Ding Shasha;
..............page:54-59
Resource Allocation Algorithm for the Downlink of Multi-User OFDM System with Optimized Fairness
Tang Limei;,Cao Haiyan;,Li Jun;,Xie Shiyi;
..............page:60-65
Effective Throughput of Cognitive Multiple Access Channel Under Collision Constraints and Imperfect Sensing
Xiao Zhengying;,Xie Xianzhong;,Zhang Senlin;
..............page:66-71
Information Assurance Framework of Military Cloud
Guo Baoping;,Cheng Jian;,Liu Weiping;
..............page:72-77
Image Fusing by Block Compressed Sensing in Contourlet Domain
Tang Aiping;,Cao Hui;
..............page:78-84
Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
Chen Xuejiao;,Wang Pan;,Liu Shidong;
..............page:85-91
Review and Prospect on the Research of 5G Spectrum
Fang Jian;,Li Jingchun;,Huang Biao;,Feng Yan;
..............page:105-112
Key Technology About Security Audit of Mobile Network Traffic for Telecom Operator
Xue Lihong;,Liang Xiaojiang;
..............page:113-118
Security Protection Method Based on Trusted Node Database in Public Places Wi-Fi
Cai Nishui;,Jiang Jiaren;
..............page:119-122
Analysis on the Security of Cloud Computing
Li Zhendong;
..............page:127-131
Smart Desktop Cloud Network
Liu Jie;,Wang Zhe;
..............page:132-137
Analysis on Potential Network Security Risk of LTE Scalable Deployment
Liu Guorong;,Liu Dongxin;,Shen Jun;,Jin Huamin;
..............page:144-149
LTE International Roaming Optimization Scheme Based on Equivalent PLMN
qin jie ;, fang zuo ;, liu hai chen ;, cheng wen bing ;, wu bing ;, pan xiao zhi ;, liang ri ming ;, chen zhi hua ;
..............page:150-154
Architecture and Solution of Lightweight TURN for C2C Communication
Wang Aijun;,Liu Bing;
..............page:155-160
Intelligent System of Wireless Network Optimization Based on Big Data Technology
Wang Lei;,Wang Xidian;,Cheng Nan;
..............page:161-165
Construction and Analysis of Intelligent Perceive Ability in IP Network
Xu Xianghui;,Zhang Yuan;,Yang Feng;
..............page:166-169
Introduction and Application Analysis of SDN in PTN
Tang Jinkai;,Zhang Qi;
..............page:170-174