Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2003 Issue 2
Optimum singular nonlinear feedback functions generated regular sequences
shen zheng yuan ; huang zheng zuo
..............page:138-143
A heuristic of multicast routing with delay and delay variation constraints
yu yan ping ; chou pei liang
..............page:132-137
The load control model and its algorithm for multi-SCP intelligent networks
liu yan ming ; ma yu xiang ; yi ke chu
..............page:125-131
Performance of transparent transponder satcom system with interference
guo dao sheng ; zhang bang ning ; gan zhong min
..............page:118-124
Performance analysis of packet CDMA system with adaptive variable-rate
he zhi biao ; zhang xin fang ; zhu guang xi
..............page:114-117
A cyclic cross-correlation based direction-of-arrival estimation approach
huang zhi tao ; wang zuo hua ; jiang wen li ; zhou yi yu
..............page:108-113
Nonlinear operator method for parameter estimation of a locally scattered source
yuan jing ; wan qun ; peng ying ning
..............page:102-107
Survey of theoretical bounds and practical constructions for frequency hopping sequences
mei wen hua ; yang yi xian ; zhou jiong
..............page:92-101
An adaptive blind beamforming algorithm for uplink in DS-CDMA system
wang jian ming ; fu xue qun ; zhao chun ming
..............page:84-91
An adaptive PSALS-SDRMTA algorithm of smart antenna in WCDMA system
ding jie wei ; li zuo peng ; huang chao ; fu feng lin
..............page:78-83
A novel ISI cancellation scheme using Viterbi equalization algorithm in low processing gain CDMA systems
chen yu ; xu chang long ; zhao chun ming ; you xiao hu
..............page:71-77
The secure electronic time-stamp system scheme
liu jun ; wu gui chen ; weng liang
..............page:64-70
The optimal analysis of design protection for WDM network
wang zhi wen ; xia qin ; li zeng zhi ; li ping jun
..............page:58-63
An image cryptosystem based on general cat map
ma zai guang ; qiu shui sheng
..............page:51-57
An analytic model of nonhierarchical telecommunication network routing scheme evaluation
shao liang ; li lei ; zhang zan bo
..............page:37-43
An equivalent transformation between discrete models and continuous models for random signals
qiu tian shuang ; wang hong yu ; chen
..............page:18-26
Blind channel estimation for vertical layered space-time codes
zhao zuo ; yin qin ye ; feng ai gang
..............page:1-9