Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2014 Issue 12
Service customized networking
LIU Yun-jie;HUANG Tao;ZHANG Jiao;LIU Jiang;YAO Hai-peng;XIE Ren-chao;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:1-9
Efficient top-k string similarity query algorithms
CHEN Zi-yang;HAN Yu-jun;WANG Xuan;ZHOU Jun-feng;School of Information Science and Engineering;Yanshan University;Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:10-20
User interest-aware content replica optimized placement algorithm
YANG Xiao-long;WANG Xin-xin;ZHANG Min;LONG Ke-ping;HUANG Qiong;College of Computer and Communication Engineering;University of Science and Technology Beijing;Key Laboratory of Mobile Communication Technology;Chongqing University of Posts and Telecommunications;
..............page:21-27
Dimension-reduction MUSIC for jointly estimating DOA and polarization using plane polarized arrays
SI Wei-jian;ZHU Tong;ZHANG Meng-ying;School of Information and Communication Engineering;Harbin Engineering University;
..............page:28-35
Method of overall resource efficiency measure of MIMO wireless communications
LIU Jin-zhu;SHEN Lian-feng;National Mobile Communications Research Laboratory;Southeast University;School of Electronic and Information Engineering;Nanjing University of Information Science and Technology;
..............page:36-44
Coverage repair strategies for wireless sensor networks based on muti-mobile nodes and genetic algorithm
YE Miao;WANG Yu-ping;WEI Jing-xuan;School of Computer Science and Technology;Xidian University;College of Information Science and Engineering;Guilin University of Technology;Guangxi Key Laboratory of Automatic Detecting Technology and Instruments;Guilin University of Electronic Technology;
..............page:45-52+61
Flow control random access protocol for event-driven machine-to-machine traffics in LTE network
YANG Liu;FAN Ping-zhi;HAO Li;Provincial Key Lab of Information Coding & Transmission;Southwest Jiaotong University;
..............page:53-61
Virtual network embedding algorithm based on negotiation in distributed environment
JIANG Yi-ming;LAN Ju-long;CHENG Dong-nian;WU Fang-ming;National Digital Switching System Engineering and Technological Research Center;College of Computer Science and Technology;Jilin University;
..............page:62-69
Packet-based routing algorithm in DTN based on the intimacy between nodes
WANG En;YANG Yong-jian;ZHAO Wei-dan;LIU Lin-lu;School of Computer Science and Technology;Jilin University;School of Software Engineering;Jilin University;
..............page:70-77
Adaptive bandwidth allocation algorithm based on the multi-threshold reservation mechanism
CHEN Geng;XIA Wei-wei;SHEN Lian-feng;National Mobile Communications Research Laboratory;Southeast University;
..............page:78-88
High capacity cross layer optimization strategy for multi-hop wireless network with interference management
SHI Lei;HAN Jiang-hong;SHI Yi;WEI Zhen-chun;School of Computer & Information;Hefei University of Technology;Dept.of ECE;Virginia Polytechnic Institute and State University;
..............page:89-97
Research on greedy reconstruction algorithms of compressed sensing based on variable metric method
LIU Pan-pan;LI Lei;WNAG Hao-yu;Unstructured Data Calculation Theory and Application Research Center;Nanjing University of Posts and Telecommunications;
..............page:98-105+115
Grid chaotic attractors based on arc tangent and its secure communication
MAO Xue-zhi;XU Yong;LIU Jian-ping;MA Hui-quan;College of Mathematics and Information Technology;Hebei Normal University of Science and Technology;Institute of Mathematics and Systems Science;Hebei Normal University of Science and Technology;School of Science;Hebei University of Technology;
..............page:106-115
Distributed nearneighbor search algorithm based on real-time traffic information in dynamic road network
YE Chen;YANG Zhen-yu;YU Jian;LONG Qi;Computer Science and Technology Department;Tongji University;Key Laboratory of Embedded System and Services Computing;Ministry of Education;Tongji University;
..............page:116-123+135
User role analysis method based on directed topological potential
DUAN Song-qing;YU Xing-long;WU Bin;WANG Bai;Cloud Testing Center;China Softuare Testing Center;School of Computer Science;Beijing University of Posts and Telecommunications;
..............page:124-135
Comprehensive trust evaluation model in social networks
MENG Xian-jia;MA Jian-feng;LU Di;WANG Yi-chuan;School of Computer Science and Technology;Xidian Univ.;Science and Technology on Communication Information Security Control Laboratory;
..............page:136-143
Method for trust analysis of exchange process behavior based on noninterference
SUN Yi;CHEN Xing-yuan;DU Xue-hui;LEI Cheng;School of Computer&Information Technology;Beijing Jiaotong University;The Fourth College;PLA Information Engineering Universiry;State Key Laboratory of Mathematical Engineering and Advanced Computing;The Thind College;PLA Information Engineering University;
..............page:144-152
Halftone image watermarking with block-directed parity-matched error diffusion
XIE Kun;ZHENG Hai-hong;ZENG Ping;GUO Tao;School of Computer and Science;Xidian University;College of Computer Science;Xi’an Shiyou University;
..............page:153-161
Performance analysis of incremental cooperative relaying system over composite multipath/shadowing fading channels
CHENG Wei-jun;HUANG Yan;School of Information Engineering;Minzu University of China;
..............page:162-167
Survey of privacy preserving data queries in cloud computing
XIAO Ren-yi;The National Natural Science Foundation of China;
..............page:168-177
Structure and performance analysis of binary differential stochastic process shift keying
XU Zhi-jiang;LING Xiao;WANG Kang;MENG Li-min;Zhejiang Provincial Key Lab.of Communication Networks & Applications;College of Information Engineering;Zhejiang University of Technology;Dept.of Computer and Information;
..............page:178-189
2-D honeycomb MI wave communication system
LIU Feng;ZHANG Zhi-jun;ZHANG Xiao-tong;XU Jin-wu;Beijing Key Laboratory of Optoelectronic Measurement Technology;Beijing Engineering Research Center of Optoelectronic Information and Instrument;Beijing Information Science & Technology University;Biomedicine School;Oregon Health and Science University;School of Computer & Communication Engineering;University of Science & Technology Beijing;School of Mechanical Engineering;University of Science & Technology Beijing;
..............page:190-195
Large-scale duplicate image retrieval technical research for the internet
WANG Shu-peng;CHEN Ming;WU Guang-jun;Institute of Information Engineering;Chinese Academy of Sciences;School of Software Engineering;Zhengzhou University of Light Industry;
..............page:196-202
Research on data loss probability and its impact of CTCS-3 train ground communication based on GSM-R
ZHANG Xia;MA Lian-chuan;CAO Yuan;ZHANG Yu-zhuo;State Key Laboratory of Rail Traffic Control and Safety;Beijing Jiaotong University;National Engineering Research Center of Rail Transportation Operation and Control System;Beijing Jiaotong University;Electronic and Information Engineering College;Beijing Jiaotong University;
..............page:203-209
Design and implementation of wireless multimedia sensor network node based on DSP and binocular vision
ZHANG Yun-zhou;JIANG Pei;GAO Liang;LI Li-qiang;College of Information Science and Engineering;Northeastern University;Department of Weaponry Engineering;Naval University of Engineering;
..............page:210-216
zhi xie
..............page:245-246