Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2009 Issue 2
Video text extraction method based on clustering
SONG Yan;LIU An-an;ZHANG Yong-dong;LIN Shou-xun
..............
page:136-140
Research of connectivity for wireless sensor networks
HUANG Xiao;CHENG Hong-bing;YANG Geng
..............
page:129-135
Approach to making strategies for network security enhancement based on attack graphs
SI Jia-quan;ZHANG Bing;MAN Da-peng;YANG Wu
..............
page:123-128
Method of speakers segmentation based on pre-segmentation
ZHENG Tie-ran;LI Hai-feng;LIU Xian;HAN Ji-qing
..............
page:118-122,128
Survey of software assurance
FANG Bin-xing;LU Tian-bo;LI Chao
..............
page:106-117
Survey of automatic attack signature generation
TANG Yong;LU Xi-cheng;WANG Yong-jun
..............
page:96-105
Structure and performance of noncoherent receivers for differential space-time modulation in correlated time-varying fading channels
HUANG Bing-gang;ZHOU Zhi-jie
..............
page:89-95
VDSC steganalysis algorithm of echo hiding
YANG Yu;LEI Min;NIU Xin-xin;YANG Yi-xian
..............
page:83-88
Wishart random matrix based Bayesian estimation for time-varying channel in the color noise
JING Yuan;YIN Fu-liang
..............
page:77-82,88
Research on quantitative assessment model on vulnerability risk for information system
ZHOU Liang;LI Jun-e;LU Tian-bo;LIU Kai-pei
..............
page:71-76
Investigations on the effects of scatterers on the MIMO channel characteristics in LOS environment
LIU Lei-lei;HONG Wei
..............
page:65-70,76
Simulation analysis of probabilistic covert channels based on probabilistic interference
GUO Yun-chuan;ZHOU Yuan;DING Li;GUO Li
..............
page:59-64
Research of duality and multi-level security model based on intransitive noninterference theory
LIU Wei-peng;ZHANG Xing
..............
page:52-58
Performance study on a novel VBLAST modulation scheme under SUC detection
JIANG Zhan-jun;PAN Wen;WANG Yan;YOU Xiao-hu
..............
page:47-51
Dynamic scheduling algorithm for streaming media based on CDN
YANG Ge;FAN Xiu-mei
..............
page:42-46
Temporal fair active queue management algorithm for multi-rate 802.11 WLAN
HUANG Jia-wei;WANG Jian-xin
..............
page:34-41
Design and implementation of a cluster virtualization based fine snapshot system
XIANG Xiao-jia;SHU Ji-wu;YU Hong-liang
..............
page:28-33
Research on an optimal QoS DBA implement mechanism of EPON multicast
ZHANG Jin-yu;YANG Wei;LIU Li
..............
page:22-27
Clustering algorithm and analysis based on objective trust modeling in MANET
ZHANG Qiang;HU Guang-ming;CHEN Hai-tao;GONG Zheng-hu
..............
page:12-21
Self-healing key distribution scheme of MANET based on sliding window
DU Chun-lai;HU Ming-zeng;ZHANG Hong-li;ZHANG Wei-zhe
..............
page:6-11
Private data isolation for OpenSSH based on virtual machines
CHEN Kang;YU Hong-liang;ZHENG Wei-min
..............
page:1-5