Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2006 Issue 5
Research on software lifecycle model based on risk management
QIAN Hong-sheng;HUANG Li-ping
..............page:135-140
Rapid acquisition scheme for UWB signal in the dense multipath environments
ZHOU Xian-jun;HU Xiu-lin;ZHANG Yun-yu;LIU Chuan-qing
..............page:126-129
Handover technique of fast-moving terminal in LEO satellite communication systems
LI QING;ZHU Li-dong;WU Shi-qi
..............page:120-125,129
VLSI architecture optimization for DFE used in Ethernet
WANG Xue-jing;YE Fan;REN Jun-yan
..............page:115-119
Analysis on call admission control in cellular wireless communication networks
MA Yu-feng;GONG Shen-guang;HU Xiu-lin;ZHANG Yun-yu
..............page:107-114
Building an E2E network troubleshooting system with mobile probes
CHEN Ming;ZHOU Jun;CHANG Qiang-lin;GAO Yi
..............page:100-106
New buffer setting scheme in multi-dimensional packet switching fabrics
ZHU Xu-dong;LI Le-min;XU Du
..............page:95-99,106
On the anti-interference of multi-band OFDM-UWB system
ZHANG Shi-bing;ZHANG Li-jun;XU Chen
..............page:77-83
Modeling and analysis for high-availability softswitch-based clustered media server
WU Nai-xing;LIAO Jian-xin;ZHU Xiao-min
..............page:70-76
Teleoperation of robots via the mobile communication networks
LI Ying-ying;LIU Yun-hui;FAN Wei-hong;CAI Xuan-ping;LI Bo
..............page:52-59
Real-valued cyclic ESPRIT Algorithm
LIU Zhi-gang;WANG Jin-kuan;Wang Fu-li
..............page:47-51
Dynamic algorithm for delay-constrained low-cost multicast routing
WANG Xin-hong;LIU Fu-qiang
..............page:41-46
Iterative channel estimation based on block-type pilot-assisted for OFDM systems
JIANG Qi;ZHAO Chun-ming;WANG Jia-heng
..............page:28-34
Energy prediction and routing algorithm in wireless sensor network
LIN Kai;ZHAO Hai;YIN Zhen-yu;ZHANG Xi-yuan
..............page:21-27
Digital signature scheme without hash functions and message redundancy
KANG Li;TANG Xiao-hu
..............page:18-20,27
New time delay estimation method based on the fractional lower order moment
GUO Ying;QIU Tian-shuang
..............page:12-17
Wavelet analysis method for detection of DDoS attack based on self-similar
REN Xun-yi;WANG Ru-chuan;WANG Hai-yan
..............page:6-11
MIMO channel estimation using implicit training
LI Yuan-jie;YANG Lv-xi;HE Zhen-ya
..............page:1-5