Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2011 Issue 3
Moving objects detection method based on H.264 compressed video with complex background
CHEN Ming-sheng;LIANG Guang-ming;SUN Ji-xiang;LIU Dong-hua;ZHAO Jian
..............page:91-97
Lattice-based oblivious transfer protocol
WANG Feng-he1;HU Yu-pu1;LIU Zhen-hua2
..............page:125-130
Hierarchical stateless single-packet IP traceback technique
HUANG Qiong1;2;XIONG Wen-zhu1;YANG Xiao-long3;XU Jie2;LONG Ke-ping2;Chengdu 611731;China; 3.College of Communication and Information Engineering;Chongqing University of Posts and Telecommunications;Chongqing 400065;China)
..............page:150-157
Convolutional coding based iterative detection algorithm for DFT-S-GMC systems
RUI Yun1;3;TANG Si-liang4;LI Ming-qi1;2;LUO Yin-hui5
..............page:33-39
Compensation for channel non-reciprocity caused by I/Q imbalance in TDD-MIMO systems
SUN De-chun;ZHANG Fei-fei;LIU Zu-jun;YI Ke-chu
..............page:79-85
Design of sequences with intra-group complementary properties for MC-CDMA systems
ZHANG Zhen-yu1;2;ZENG Fan-xin2;XUAN Gui-xin2;WU Hua1;ZHONG Yuan-hong1
..............page:27-32,39
Masquerade detection based on shell commands and Markov chain models
XIAO Xi1;TIAN Xin-guang2;ZHAI Qi-bin1;YE Run-guo3
..............page:98-105
Analogous quasi-orthogonal designs linear dispersion codes under decode-and-forward cooperative relay networks
LI Zheng-quan1;2;SHEN Lian-feng2;GUO Yong-liang2
..............page:40-49,59
The lower bound of the second order nonlinearity of Tr(x~(2~(n/2)+2~(n/2-1)+1))
CHEN Xin-jiao1;ZENG Xiang-yong2;3;HU Lei3;Beijing 100049;China)
..............page:86-90
Formalism ordering method based on term rewriting and application
CHEN Chen1;CHEN Wei-hong1;YAN Zhen-tian2;ZHU Yue-fei1
..............page:138-142
Research on survivable mesh WDM optical networks using load-balancing mechanism
WANG Ru-yan;WU Da-peng;HUANG Sheng
..............page:1-9
Generic construction of deniable group key establishment from group key establishment
ZHANG Ya-zhe;XU Hai-xia;LI Bao
..............page:143-149
Computationally sound mechanized proof for a non-repudiation protocol
FENG Chao;CHEN Yue-bing;ZHANG Quan;TANG Chao-jing
..............page:18-26
Overlap area assisted guaranteed handover scheme for HAP communications systems
LI Shu-feng;WEI Ji-bo;MA Dong-tang;WANG Li-jie
..............page:131-137
Value-oriented optimal algorithm for battlefield information processing and disseminating
QIN Guang-cheng1;YIN Hao2;CHEN Qiang2;WU Ze-min1;YANG Pan-long1
..............page:60-68
Research on establishing network intrusion modeling based on MLL-AT
YAN Fen1;2;YIN Xin-chun1;HUANG Hao2
..............page:115-124
Cooperation image compression algorithm using divergence model for visual sensor networks
YE Song-tao1;2;LIN Ya-ping1;2;YI Ye-qing1;2
..............page:69-78
Non-uniform distribution node scheduling scheme in wireless sensor networks
FAN Gao-juan1;2;SUN Li-juan1;WANG Ru-chuan1;HUANG Hai-ping1;XIAO Fu1;LI Jing1
..............page:10-17
Dynamic secure trust management model for P2P e-commerce environments
LI Zhi-yuan1;WANG Ru-chuan1;2;3
..............page:50-59
Foreground object detection based on time information window adaptive kernel density estimation
ZHOU En-ce;LIU Chun-ping;ZHANG Ling-yan;GONG Sheng-rong;LIU Quan
..............page:106-114,124