Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2009 Issue 4
Shape description based on axis of least inertia and chain
LI Zong-min;LU Tian-bo;SANG Xin-yan;QIN Bao-shan
..............page:1-5
Human skin aion detection in Web video Human skin region detection in Web video
GUO Jun-bo;ZHANG Dong-ming;ZHANG Yong-dong;XU Jie;WANG Wen-ying
..............page:6-10
Modeling the mobile communication service based on PI-calculus
KANG Hui;ZENG Ying-ying;LIU Zhi-yong
..............page:11-16
Efficient anonymous password-based authenticated key exchange scheme
TAN Shi-chong;PANG Liao-jun;SU Wan-li;WANG Yu-min
..............page:17-20
Identity based and key insulated cryptosystem
ZHOU Yuan;QIN Bao-shan;CAO Zhen-fu
..............page:21-26
Constant modulus algorithm for blind equalization under impulsive noise environments
GUO Ying;QIU Tian-shuang;TANG Hong;PARK Yong-Wan
..............page:35-40
Video steganalysis scheme based on inter-frame collusion
LIU Bin;LIU Fen-lin;YANG Chun-fang
..............page:41-49,59
Energy-efficient object tracking algorithm in wireless sensor networks
REN Qian-qian;LI Jian-zhong;LI Jin-bao;ZHU Jing-hua
..............page:50-59
Next generation network resource allocation method based on cooperative game and decision-making in advance
RAO Xiang;ZHANG Shun-yi;SUN Yan-fei;DING Wen-tao
..............page:60-65
WGRe:a re-encryption anonymous tunnel
LU Tian-bo;QIN Bao-shan;LI Yang;DING Li
..............page:66-73
Load balance multicast routing algorithms on overlay network
ZHANG Xiao-yu;ZHANG Guang-zhao
..............page:86-92
Self-defence model of SIP proxy server for against DoS attack
ZHANG Zhao-xin;DU Yue-jin;LI Bin;ZHANG Hong-li
..............page:93-99
New design method of space-frequency coding and fast detection algorithm
WANG Xin;WEI Ji-bo;LI Ying
..............page:100-105,112
Evaluation method for network invulnerability based on shortest route number
RAO Yu-ping;LIN Jing-yu;HOU De-ting
..............page:113-117
Performance analytic model and method for CCF multi-channel mechanism
YAN Jun-rong;ZHANG Shun-yi;SUN Yan-fei;LI Jun
..............page:118-124
Target sampling based on routing behavior analysis in network topology measurement
ZHANG Yu;FANG Bin-xing;ZHANG Hong-li
..............page:125-129
ID-based wireless authentication scheme with anonymity
ZHU Hui;LI Hui;SHU Wan-li;WANG Yu-min
..............page:130-136
Data hiding method based on color table expansion technique
FEI Ru-chun;WANG Lin-a;ZHANG Huan-guo
..............page:137-140