Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2012 Issue 9
Multi-language oriented automatic realization method for cryptographic protocols
LI Xing-hua1;2;LI Shuai-tuan1;LI Deng1;MA Jian-feng1
..............page:152-159
Research on input-queued slicing domain scheduling based on Crossbar in the reconfigurable network
ZHANG Bo1;WANG Bin-qiang1;WANG Shan-shan1;WEI Hong-quan1;LI Hui2;Zhengzhou 450002;China; 2.Shenzhen Key Lab of Cloud Computing Technology and Application;Peking University Shenzhen Graduate School;Shenzhen 518055;China)
..............page:105-115
Stable enclosure based hybrid routing schema in heterogeneous wireless networks
LI Zhi1;2;3;JIANG Yi2;LI Qian-mu2;LIU Feng-yu2
..............page:95-104
Efficient attack detection and data aggregation algorithm
CHENG Hong-bing1;2;3;RONG Chun-ming3;HUANG Xiao4;EGGEN Skjalg3;ZENG Qing-kai1
..............page:85-94
Polynomial estimation method for PN sequence based on reliability accumulation
CHEN Song;HUANG Kai-zhi;ZHAO Hua
..............page:125-131
Danger theory inspired intrusion detection model for wireless sensor networks
FU Rong-rong1;ZHENG Kang-feng2;LU Tian-liang2;YANG Yi-xian1;2
..............page:31-37
Research on differential properties of Keccak-like nonlinear transform
LI Qian-nan1;LI Yun-qiang1;JIANG Shu-jing2;LU Yao3
..............page:140-146
Hole recovery algorithm based on mobile inner nodes in wireless sensor networks
YANG Kai1;LIU Quan1;ZHANG Shu-kui1;2;LI Jin1;WENG Dong-liang1
..............page:116-124
Research on energy-saving method based on reconfigurable network architecture
LIAO Sheng-quan1;WU Chun-ming1;WANG Bin1;JIANG ming2
..............page:77-84
Study on self-similar call admission control algorithm in WiMAX
HU Yong-dong1;2;3;WU Guo-xin1;2;QIAN Ning1;2;ZHANG San-feng1;2
..............page:8-14
Dynamic resource allocation scheme for multiuser OFDM–UWB systems based on user’s rate
CHENG Chao;QIAN Zhi-hong;LI Chun-lan;WANG Xue
..............page:160-167
Research on the cloud services provider-oriented services selection method
ZHANG Yun-yong1;LI Su-fen1;WU Jun2;FANG Bing-yi1
..............page:66-76
Evolving multicast tree based artificial fish swarm algorithm
MA Xuan;LIU Qing
..............page:1-7
Three-dimensional polarization amplitude modulator and demodulator
SONG Han-bin;ZHANG Jun-bo;CHEN Xiao-guang;ZHANG Jian-qiu
..............page:15-22
Effects on lifetime of opportunistic network based on Epidemic routing under flooding attacks
SUN Jian-zhi;ZHANG Ying-xin;CHEN Dan;HAN Zhong-ming
..............page:185-190
Mobile sink-based data collection scheme for wireless sensor networks
GUO Jian1;2;3;SUN Li-juan1;2;3;XU Wen-jun1;WANG Ru-chuan1;2;3;XIAO Fu1;2;3
..............page:176-184
New class of frequency-hopping sequences set with optimal average Hamming correlation property
KE Pin-hui;ZHANG Hai-hui;ZHANG Sheng-yuan
..............page:168-175
Structure-free and dynamic-adaptive data fusion algorithm for wireless sensor networks
YUE Jun;ZHANG Wei-ming;XIAO Wei-dong;TANG Da-quan;TANG Jiu-yang
..............page:53-65
Analysis and improvement of route switch in IEEE 802.11s
YOU Bo1;2;YAN Yue-peng1;2
..............page:23-30
FTIR microscopic image analysis based on 2DPCA
YANG Xiu-kun1;ZHONG Ming-liang1;2;JING Xiao-jun2;ZHANG Jie2
..............page:147-151
Target counting algorithm via local signal recovery in sensor networks
JIANG Wen-tao1;2;SUN Li-min3;LV Jun-wei2;ZHU Hong-song3
..............page:44-52
Performance analysis of packet cooperative relaying system and the effect of packet length on performance
LIU Shao-yang1;XI Yong1;LI Ying2;WEI Ji-bo1;ALISTER Burr3
..............page:132-139
Research on load-balanced construction algorithm of logical carrying network
WANG Hao-xue1;JIANG Ming2;FU Ji1
..............page:38-43