Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2012 Issue 11
Perceptual image hashing sensitive to content modification
NI Li-jia;WANG Shuo-zhong;WU Qiu-min;PEI Bei
..............page:177-184
Clustered P2P based resource query and dissemination for multi-hop wireless mesh network
WEN Ji-gang1;2;XIE Kun2;XIE Gao-gang1;ZHANG Guang-xing1;LI Ren-fa2
..............page:128-135
Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying
LU Wei-dang1;2;WU Xuan-li2;SHA Xue-jun2;ZHANG Nai-tong2
..............page:74-83
Clustering scheme of base stations cooperation based on maximizing the average system performance
LI Kun1;2;HUANG Kai-zhi1;JI Jiang1;FENG Tao1;JIN Yan-qing1
..............page:144-150
Efficient storage method for FPGA-based partially parallel QC-LDPC decoder
YUAN Rui-jia1;2;BAI Bao-ming1;2
..............page:165-170
Optimal configuration algorithm for static segment of FlexRay
XIE Yong;LI Ren-fa;RUAN Hua-bin;PENG Xin
..............page:33-40
Research on dynamic array honeypot for collaborative network defense strategy
SHI Le-yi1;LI Jie1;LIU Xin1;JIA Chun-fu2
..............page:159-164
Performance analysis and re-modeling of secondary users in cognitive radio system
LIN Wei;FU Yu;ZHANG Qin-yu;WANG Ye;WANG Sheng
..............page:108-118
Context-aware and self-adaptive trust model for pervasive computing
WANG Jiang-tao1;2;CHEN Zhi-gang1;DENG Xiao-heng1
..............page:41-48,56
Game theoretical routing protocol with fairness problem in wireless mesh networks
JI Wen-jiang;MA Jian-feng;TIAN You-liang;MA Zhuo
..............page:17-23
Novel method of constructing the zero-sum distinguishers
DONG Le1;2;WU Wen-ling1;WU Shuang1;ZHOU Jian1;2
..............page:91-99
Guess and determine attack on E0 algorithm
ZHAN Ying-jie;DING Lin;GUAN Jie
..............page:185-190
Self-adaptive encryption algorithm for image based on affine and composed chaos
WEN Chang-ci1;WANG Qin1;HUANG Fu-min2;YUAN Zhi-shu3;TAO Chun-sheng4
..............page:119-127
Design of network management and regulation system over flexible reconfiguration
LI Yu-feng;QIU Han;LIU Qin-rang;LAN Ju-long
..............page:84-90
Scalable video coding algorithm based on 3D hybrid tree and visual characteristics
FU Ming-zhe1;WANG Xiang-hai1;2;SONG Chuan-ming1
..............page:100-107
Blind recognition of real orthogonal STBC based on independent component analysis
ZHAO Zhi-jin1;2;CHEN Lin1;WANG Hai-quan1;SHEN Lei1
..............page:1-7
Research towards IoT-oriented universal control system security model
YANG Jin-cui1;2;FANG Bin-xing1;2;ZHAI Li-dong3;ZHANG Fang-jiao1;3
..............page:49-56
Research on pulse width model of optical signal based on effects of combined physical impairments
ZHAO Ji-jun1;2;GUO Kun1;2;LI Zhi-hua1;2;WANG Li-rong3;ZHAO Wen-yu4
..............page:8-16
Method for reducing the complexity of clock domain crossing design and its verification in system-on-chips
LIU Dan1;FENG Yi2;DANG Xiang-lei2;TONG Dong2;CHENG Xu2;WANG Ke-yi2
..............page:151-158
Life cycle constrained backoff algorithm for ad hoc network
WANG Ye-qun;HUANG Guo-ce;ZHANG Heng-yang;ZHENG Bo;JING Yuan
..............page:57-66