Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2011 Issue 8
Image and video resizing algorithm based on importance diffusion and adaptive scaling
WANG Hui-qian1;YANG Gao-bo1;2;ZHANG Zhao-yang3;XIA Zhong-chao1;Ministry of Education;Shanghai 200072;China)
..............page:165-170
Improved Cache trace driven attack on AES and CLEFIA
ZHAO Xin-jie1;GUO Shi-ze2;WANG Tao1;LIU Hui-ying1
..............page:101-110
Blind estimation of spreading sequence of CDMA signals based on Fast-ICA and performance analysis
LU Feng-bo;HUANG Zhi-tao;JIANG Wen-li
..............page:136-142
Analysis and design of triangular symmetric double ridged waveguide by finite element method
CHEN Xiao-qiang1;REN En-en1;LU Mai2;WANG Lei1
..............page:31-37
Research on intrusion detection based on network events and deep protocol analysis
ZHU Ying-ying;WU Jin-feng;MING Zhong
..............page:171-178
Modeling and analysis of performance reliability for communication networks based on traffic dynamics
ZHAO Juan1;2;GUO Ping1;DENG Hong-zhong2;WU Jun2;TAN Yue-jin2;LI Jian-ping1
..............page:159-164
Some results about negabent functions
REN Chuan-lun1;2;3;LIU Feng-mei4;LI Zhong-xian1;2;5;NIU Xin-xin1;2;YANG Yi-xian1;2
..............page:179-182
LEACH protocol based security mechanism for Sybil attack detection
CHEN Shan-shan1;2;YANG Geng2;CHEN Sheng-shou2
..............page:143-149
Multi-service transmission method based on multi-chirp-rate CSS
ZHAO Qi-ming1;2;ZHANG Qin-yu1;ZHANG Nai-tong1;2
..............page:8-14
Novel approach based on neighborhood relation signature against polymorphic internet worms
WANG Jie1;WANG Jian-xin1;LIU Xu-chong2
..............page:150-158
Zero-correlation zone complementary sets based on iteration
LI Yu-bo;XU Cheng-qian
..............page:38-44,54
(ε,δ)-approximate Top-k query processing algorithm in wireless sensor networks
BI Ran;LI Jian-zhong;CHENG Si-yao
..............page:45-54
Related-key rectangle attack on the full ARIRANG encryption mode
ZHANG Peng1;LI Rui-lin1;LI Chao1;2
..............page:15-22
Trusted coalition-proof protocol model based on secure multi-part computing
CHENG Bai-liang1;ZENG Guo-sun1;JIE An-quan2
..............page:23-30
Coverage control strategy for directional sensor networks
LI Jing;WANG Ru-chuan;HUANG Hai-ping;SUN Li-juan;XIAO Fu;JIANG Ling-yun
..............page:118-127
Research on trust transitivity and aggregation in evidential trust model
JIANG Li-ming1;ZHANG Kun1;XU Jian1;2;LIAO Jun1;ZHANG Hong1
..............page:91-100
State transition probability based sensing duration optimization algorithm in cognitive radio
ZHANG Xiao;WANG Jin-long;WU Qi-hui
..............page:72-80
Optimized AODV routing protocol based on reverse route search in leisure time and route learning
DU Qing-song1;2;ZHU Jiang1;ZHANG Er-yang1
..............page:64-71
Research on large-scale P2P worm simulation
WU Guo-zheng;QIN Zhi-guang
..............page:128-135