Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2009 Issue 2
Video text extraction method based on clustering
SONG Yan;LIU An-an;ZHANG Yong-dong;LIN Shou-xun
..............page:136-140
Research of connectivity for wireless sensor networks
HUANG Xiao;CHENG Hong-bing;YANG Geng
..............page:129-135
Approach to making strategies for network security enhancement based on attack graphs
SI Jia-quan;ZHANG Bing;MAN Da-peng;YANG Wu
..............page:123-128
Method of speakers segmentation based on pre-segmentation
ZHENG Tie-ran;LI Hai-feng;LIU Xian;HAN Ji-qing
..............page:118-122,128
Survey of software assurance
FANG Bin-xing;LU Tian-bo;LI Chao
..............page:106-117
Survey of automatic attack signature generation
TANG Yong;LU Xi-cheng;WANG Yong-jun
..............page:96-105
VDSC steganalysis algorithm of echo hiding
YANG Yu;LEI Min;NIU Xin-xin;YANG Yi-xian
..............page:83-88
Research on quantitative assessment model on vulnerability risk for information system
ZHOU Liang;LI Jun-e;LU Tian-bo;LIU Kai-pei
..............page:71-76
Simulation analysis of probabilistic covert channels based on probabilistic interference
GUO Yun-chuan;ZHOU Yuan;DING Li;GUO Li
..............page:59-64
Performance study on a novel VBLAST modulation scheme under SUC detection
JIANG Zhan-jun;PAN Wen;WANG Yan;YOU Xiao-hu
..............page:47-51
Dynamic scheduling algorithm for streaming media based on CDN
YANG Ge;FAN Xiu-mei
..............page:42-46
Temporal fair active queue management algorithm for multi-rate 802.11 WLAN
HUANG Jia-wei;WANG Jian-xin
..............page:34-41
Design and implementation of a cluster virtualization based fine snapshot system
XIANG Xiao-jia;SHU Ji-wu;YU Hong-liang
..............page:28-33
Research on an optimal QoS DBA implement mechanism of EPON multicast
ZHANG Jin-yu;YANG Wei;LIU Li
..............page:22-27
Clustering algorithm and analysis based on objective trust modeling in MANET
ZHANG Qiang;HU Guang-ming;CHEN Hai-tao;GONG Zheng-hu
..............page:12-21
Self-healing key distribution scheme of MANET based on sliding window
DU Chun-lai;HU Ming-zeng;ZHANG Hong-li;ZHANG Wei-zhe
..............page:6-11
Private data isolation for OpenSSH based on virtual machines
CHEN Kang;YU Hong-liang;ZHENG Wei-min
..............page:1-5