Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2010 Issue 10
Path assessment based network admission control algorithm
QIU Gong-an1;XU Chen1;ZHANG Guo-an1;2;BAO Zhi-hua1
..............page:108-114
Dynamic flow control mechanism in large-scale streaming media multicast systems
WANG Hui;SUN Zhi-gang;DAI Bin;HE Jun-feng;GONG Zheng-hu
..............page:88-97
Node characteristics based LR-WPAN routing algorithm research for network energy optimization
QIAN Zhi-hong;ZHANG Xiao-fan;WANG Yi-jun;GUAN Ting-yan
..............page:238-243
Secure topology protocol for mobile peer-to-peer networks
LI Zhi-yuan1;WANG Ru-chuan1;2;3
..............page:146-157
Adaptive guaranteed time slots allocation policy in wireless sensor networks with mobility awareness
LI Xiao-ji1;CHEN Chen1;QIU Hong-bing2;MO Wei2
..............page:212-220
End-to-end multipath transport layer architecture oriented the next generation network
XUE Miao;GAO De-yun;ZHANG Si-dong;ZHANG Hong-ke
..............page:26-35
Information exchange model of multi control nodes in trustworthy and controllable network
WANG Peng;LUO Jun-zhou;LI Wei;ZHENG Xiao;QU Yan-sheng
..............page:68-78
Review of next generation network architecture
SHEN Qing-guo1;YU Zhen-wei1;GONG Jing2
..............page:3-17
Research on new kind of parallel packet switch based on CICQ
REN Tao;LAN Ju-long;HU Hong-chao;CHENG Dong-nian
..............page:98-107
Discovery of internet topology knowledge and its applications
ZHANG Guo-qing
..............page:18-25
Short path first overlay building
WU Guo-fu;HAN Gang;DOU Wen-hua
..............page:170-179
Anonymous access protocol for media independent information service
LI Guang-song1;2;MA Jian-feng1;JIANG Qi1 ;Xidian University;Xi'an 710071;China;2.Department of Information Research;Information Engineering University;Zhengzhou 450002;China)
..............page:128-137
Time slot-based RED algorithm on self-similar flows:SFRED
WANG Hui;JI Zhen-zhou;SUN Yan-dong;WANG Yuan-zheng
..............page:115-120
Access mechanism of TMP under mobile network
WU Zhen-qiang;ZHOU Yan-wei;QIAO Zi-rui
..............page:158-169
Research on network survivability of distance vector routing protocol
WANG Bin1;2;GUO Yun-fei2;LAN Ju-long2;WU Chun-ming1
..............page:121-127
Optimal cluster head deployment in heterogeneous wireless sensor networks
LIU Lin1;YU Hai-bin2
..............page:229-237
Reconstructing application layer multicast trees based on back-path scheme
CAO Ji-jun1;XIE Jing2;SU Jin-shu1
..............page:190-202
Hybrid optimal cluster routing protocol for mobile ad hoc network
NIU Xiao-guang1;2;CUI Li2;HUANG Chang-cheng2
..............page:58-67
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
JIANG Qi1;MA Jian-feng1;LI Guang-song1;2;LIU Hong-yue1 ;Xidian University;Xi'an 710071;China;2.Department of Information Research;Information Engineering University;Zhengzhou 450002;China)
..............page:138-145
qian yan
luo jun zhou
..............page:1-2
Adaptive opportunistic routing protocol based on forwarding-utility for delay tolerant networks
WANG Bo1;HUANG Chuan-he1;YANG Wen-zhong2
..............page:36-47
Resource control conflict detection mechanism in trustworthy and controllable network
QU Yan-sheng;LUO Jun-zhou;LI Wei;WANG Peng;TAN Jing
..............page:79-87
Node heterogeneous degree-based consistency maintenance method for unstructured overlay networks
YANG Lei;LI Ren-fa;HU Yi-ming;LI Ken-li
..............page:180-189
Conjunct model of cloud & client computing based on multi-agent
XU Xiao-long;CHENG Chun-ling;XIONG Jing-yi
..............page:203-211