Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2003 Issue 8
Research & implementation of security communication mechanism for virtual private network
wu yue ; shu chao ming ; bo yong hua ; hu ai qun ; bi guang guo
..............page:168-176
An adaptive algorithm for p-persistent CSMA/CD policy
mao xiu wei ; wu tie jun
..............page:161-167
Digital multisignatures scheme based on RSA
zhang jian hong ; wei yong zhuang ; wang yu min
..............page:150-154
Study on the Turbo product coded PSAM system with two-branch receive diversity
liu wei ; zhang hai lin ; liu zeng ji
..............page:145-149
Call admission control in wireless mobile communication systems
gong wen bin ; gan zhong min
..............page:135-144
GMPLS-based distributed routing of shared restoration connections in WDM mesh networks for dynamic traffic demand
lei lei ; zhao ji jun ; wei jian yong ; ji yue feng
..............page:128-134
The DSP implementation of real-time H.263+ video encoder
song bin ; chang yi lin
..............page:88-94
Design and implementation of an embedded real-time Java OS
wang ji yong ; lin tao ; wang jin dong ; han guang jie ; zhao hai
..............page:78-87
Conformance testing of communication protocol with semi-controllable interfaces
wu hui ping ; qu yu gui ; zhao bao hua
..............page:72-77
Effects of fabrication errors on the crosstalk of an AWG
dai dao xin ; xu jing ; liu shu zhe ; he sai ling ; he jian jun
..............page:65-71
An iterative joint channel estimation and symbol detection algorithm for OFDM systems
han bing ; wang jian ming ; gao xi qi ; you xiao hu
..............page:58-64
A novel explicit error bit notification mechanism for wireless network
xu chang biao ; long ke ping ; yang shi zhong
..............page:51-57
A new Doppler estimator based on fast power-control
li qin ; yang hong wen ; guo wen bin ; yang da cheng
..............page:45-50
Research on a chaotic image encrypted approach
wu min ; qiu shui sheng
..............page:31-36
AIMD with coupon mechanism
zhao yong xiang ; chen chang jia
..............page:22-30
Edge-to-edge bandwidth estimation based packet marker
liu zheng lan ; zhu zuo liang
..............page:12-21
Correlation-immunity of a multi-valued combiner with memory
chen zuo hong ; lian yu zhong
..............page:6-11
The distributed broadband network virus precaution system
wang bai ling ; fang bin xing ; yun xiao chun
..............page:122-127
Dynamic authentication scheme based on smart card
wang bin ; li jian hua
..............page:117-121
The design and implementation of the secure mechanism for Windows-based VPN
zhang feng ; ye cheng qing
..............page:108-116
FDTD analysis of novel dual-band planar inverted-F antenna
tian fang ; li dong feng ; gong zhong zuo
..............page:101-107
Channel estimation algorithm based on vector average
xu bin ; yang chen yang ; mao shi yi
..............page:95-100