Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2013 Issue 3
Construction and count of resilient rotation symmetric Boolean functions with prime number variables
DU Jiao1;2;WEN Qiao-yan1;ZHANG Jie3;PANG Shan-qi4
..............page:6-13
Local density-based similarity matrix construction for spectral clustering
WU Jian1;CUI Zhi-ming1;SHI Yu-jie1;SHENG Sheng-li2;GONG Sheng-rong1
..............page:14-22
Trustworthy component model supporting networks reconfiguration
YUAN Bo1;WANG Bin-qiang1;MA Dong-chao2
..............page:32-43
Connection status aware cost efficient message transmission mechanism in opportunistic networks
WU Da-peng;ZHANG Pu-ning;WANG Ru-yan
..............page:44-52
Occluded building height estimation from single HR SAR image based on an iterative model matching technique
JIANG Li-bing1;WANG Zhuang1;LEI Lin1;YU Wen-xian2
..............page:68-75
Research on routing protocol of vehicular delay-tolerant networks
JIANG Hai-tao;ZHANG Hong;LI Qian-mu
..............page:76-84
Breaking the HFEM public key scheme
GU Chun-sheng1;2;3
..............page:85-89,98
Design and implementation: an open and reconfigurable router architecture with different network system supported
LU Ze-xin;ZHANG Xiao-zhe;MA Shi-cong;WANG Bao-sheng
..............page:126-133
Transmission scheme and capacity analysis of onboard multi-antenna system in high-speed train
LUO Wan-tuan1;2;FANG Xu-ming1;CHENG Meng1;ZHOU Xiang-juan1;3
..............page:90-98
Automatic generating regular expression signatures for real network worms
TANG Yong1;ZHUGE Jian-wei2;CHEN Shu-hui1;LU Xi-cheng1
..............page:141-147
IDS alert clustering algorithm based on chaotic particle swarm optimization
XU Xiao-bo1;2;JIANG Qin-qin 2;ZHENG Kang-feng2;WU Bin2;YANG Yi-xian2
..............page:105-110
Representation and termination analysis for ECA rules based on extended Petri net
ZHANG Li-chen;WANG Xiao-ming;DOU Wen-yang
..............page:157-164
Constructing fair-exchange protocols for cloud computing
LAN Cai-hui1;2;WANG Cai-fen1
..............page:111-118
Lossless sharing visual cryptography
YU Bin;FU Zheng-xin
..............page:165-170
Agent-based dynamic spectrum trading algorithm in cognitive radio network
ZHANG Shi-bing;ZHANG Guo-dong;BAO Zhi-hua
..............page:119-125
Novel restructuring method for CP-based LS channel estimation in OFDM system
ZHAO Wang-xing;WAN Qun;CHEN Zhang-xin
..............page:175-182,191
Three-dimensional spherical model based XML communication protocols security evaluation method
YANG Hong-yu;YU Jin-bo;XIE Li-xia
..............page:183-191
Light intensity,spectrum and polarization information fusion based underwater object detection
CHEN Zhe;WANG Hui-bin;SHEN Jie;XU Li-zhong
..............page:192-198
Jointed LDPC codes design for half-duplex relay channels
CHEN Zi-qiang1;OUYANG Shan1;2;XIAO Hai-lin2;XIE Yue-lei2
..............page:134-140
Network traffic prediction based on FARIMA-GARCH model
YANG Shuang-mao1;2;GUO Wei2;TANG Wei2
..............page:23-31