Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal on Communications
1000-436X
2009 Issue 4
Shape description based on axis of least inertia and chain
LI Zong-min;LU Tian-bo;SANG Xin-yan;QIN Bao-shan
..............
page:1-5
Human skin aion detection in Web video Human skin region detection in Web video
GUO Jun-bo;ZHANG Dong-ming;ZHANG Yong-dong;XU Jie;WANG Wen-ying
..............
page:6-10
Modeling the mobile communication service based on PI-calculus
KANG Hui;ZENG Ying-ying;LIU Zhi-yong
..............
page:11-16
Efficient anonymous password-based authenticated key exchange scheme
TAN Shi-chong;PANG Liao-jun;SU Wan-li;WANG Yu-min
..............
page:17-20
Identity based and key insulated cryptosystem
ZHOU Yuan;QIN Bao-shan;CAO Zhen-fu
..............
page:21-26
Asymmetric watermarking based on Contourlet transform and subspace projection
HE Mi;CHENG Li-zhi
..............
page:27-34
Constant modulus algorithm for blind equalization under impulsive noise environments
GUO Ying;QIU Tian-shuang;TANG Hong;PARK Yong-Wan
..............
page:35-40
Video steganalysis scheme based on inter-frame collusion
LIU Bin;LIU Fen-lin;YANG Chun-fang
..............
page:41-49,59
Energy-efficient object tracking algorithm in wireless sensor networks
REN Qian-qian;LI Jian-zhong;LI Jin-bao;ZHU Jing-hua
..............
page:50-59
Next generation network resource allocation method based on cooperative game and decision-making in advance
RAO Xiang;ZHANG Shun-yi;SUN Yan-fei;DING Wen-tao
..............
page:60-65
WGRe:a re-encryption anonymous tunnel
LU Tian-bo;QIN Bao-shan;LI Yang;DING Li
..............
page:66-73
LiteST:a lightweight secure time synchronization protocol for wireless sensor networks
YIN Xiang-lan;QI Wang-dong
..............
page:74-85
Load balance multicast routing algorithms on overlay network
ZHANG Xiao-yu;ZHANG Guang-zhao
..............
page:86-92
Self-defence model of SIP proxy server for against DoS attack
ZHANG Zhao-xin;DU Yue-jin;LI Bin;ZHANG Hong-li
..............
page:93-99
New design method of space-frequency coding and fast detection algorithm
WANG Xin;WEI Ji-bo;LI Ying
..............
page:100-105,112
Improved method of compensating non-reciprocal interference in adaptive TDD MIMO-OFDM systems
ZENG Duan-yang;SONG Rong-fang
..............
page:106-112
Evaluation method for network invulnerability based on shortest route number
RAO Yu-ping;LIN Jing-yu;HOU De-ting
..............
page:113-117
Performance analytic model and method for CCF multi-channel mechanism
YAN Jun-rong;ZHANG Shun-yi;SUN Yan-fei;LI Jun
..............
page:118-124
Target sampling based on routing behavior analysis in network topology measurement
ZHANG Yu;FANG Bin-xing;ZHANG Hong-li
..............
page:125-129
ID-based wireless authentication scheme with anonymity
ZHU Hui;LI Hui;SHU Wan-li;WANG Yu-min
..............
page:130-136
Data hiding method based on color table expansion technique
FEI Ru-chun;WANG Lin-a;ZHANG Huan-guo
..............
page:137-140