Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2014 Issue 5
Distributed two-way relay selection scheme and users power allocation
RUI Guo-sheng;WANG Lin;ZHANG Yang;ZHANG Hai-bo;Department of Electronic and Information Engineering;Naval Aeronautical and Astronautical University;Graduate Students’ Brigade;Naval Aeronautical and Astronautical University;
..............page:1-7
Trust system based on node behavior detection in Internet of Things
LIU Yan-bing;GONG Xue-hong;FENG Yan-fen;School of Computer Science and Technology;Chongqing University of Posts and Telecommunications;
..............page:8-15
App-DDoS detection method based on K-means multiple principal component analysis
YANG Hong-yu;CHANG Yuan;School of Computer Science and Technology;Civil Aviation University of China;
..............page:16-24
Dynamic bandwidth allocation algorithm based on transmission rate adaptation
CHEN Geng;XIA Wei-wei;SHEN Lian-feng;National Mobile Communications Research Laboratory;Southeast University;
..............page:25-32
Attribute-based authenticated key agreement protocol supporting revocation
LI Qiang;FENG Deng-guo;ZHANG Li-wu;TCA;Institute of Software;Chinese Academy of Sciences;
..............page:33-43
Immune algorithm-based base station location optimization in the TD-SCDMA network
ZHANG Ying-jie;MAO Ci-ping;ZU Yun-xiao;SUN Xian-you;School of Information Science and Engineering;Hunan University;Institute for Communications Energy Conservation;Hunan University;School of Electronic Engineering;Beijing University of Posts and Telecommunications;
..............page:44-48
Approach for distributed BPEL engine placement using K-means
LIN Rong-heng;WU Bu-dan;ZHAO Yao;YANG Fang-chun;State Key Lab of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:49-56
Design and analysis of multi-channel MAC scheduling code for mobile ad hoc network
LI Xi-yang;FAN Ping-zhi;Institute of Mobile Communications;Southwest Jiaotong University;School of Mathematical Sciences;Guangxi Teachers Education University;
..............page:57-64+69
McEliece public key cryptosystem attack algorithm based on enumeration error vector
LIU Jing-mei;WANG Yan-li;LIANG Bin;ZHAO Lin-sen;National Key Laboratory of Integrated Service Networks;Xidian University;College of Electronic Engineering;Xi’an University of Post & Telecommunications;
..............page:65-69
Otsu thresholding method based on projection of cross section for image segmentation
FAN Chao-dong;OUYANG Hong-lin;XIAO Le-yi;College of Electrical and Information Engineering;Hunan University;Office of Academic Affairs;Changsha Normal University;
..............page:70-78+87
Chosen message attacks method against ECC implementations
LUO Peng;LI Hui-yun;WANG Kun-peng;WANG Ya-wei;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Shenzhen Institutes of Advanced Technology;Institute of Information Engineering;Chinese Academy of Sciences;HUADA INFOSEC;
..............page:79-87
Robustness design of templates for logic OR operation CNN in gray-scale images
ZHANG Qun;MIN Le-quan;School of Automation and Electrical Engineering;University of Science and Technology Beijing;School of Mathematics and Physics;University of Science and Technology Beijing;
..............page:88-94
Measurement of evidence conflict based on correlation coefficient
SONG Ya-fei;WANG Xiao-dan;LEI Lei;XUE Ai-jun;School of Air and Missile Defense;Air Force Engineering University;
..............page:95-100
Utility-driven based co-allocation resource reservation strategy in computational grid
DING Chang-song;WANG Zhi-ying;HU Zhi-gang;School of Administration and Information Engineering;Hunan University of Chinese Medicine;College of Computer;National University of Defense Technology;School of Software;Central South University;
..............page:101-107
Abnormal data filtering approach based on collective trust for WSN
XU Xiao-bin;ZHANG Guang-wei;WANG Shang-guang;SUN Qi-bo;YANG Fang-chun;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:108-117+123
Security analysis and improvement of strongly secure certificate less signature scheme
FAN Ai-wan;YANG Zhao-feng;XIE Li-ming;Software School;Pingdingshan College;Computer Science and Technology Department;Pingdingshan College;
..............page:118-123
ISI sparse channel estimation based on ISL0 algorithm
LIU Ting;ZHOU Jie;JUCHI Jiu-he;College of Electronic and Information Engineering;Nanjing University of Information Science and Technology;Dept.of Electronic and Electrical Engineering;Niigata University;
..............page:124-133
Congestion control mechanism in VANET for safety messaging
SUN Jian;LI Hong-zhi;GUO Ling-bo;CHEN Sheng-lai;The 28th Research Institute of China Electronics Group Corporation;
..............page:134-140
Survey on channel assignment algorithms using partially overlapped channels in wireless Mesh network
WANG Ji-hong;SHI Wen-xiao;LI Yu-xin;JIN Feng;WANG Chun-yue;College of Communication Engineering;Jilin University;
..............page:141-154
Flow-splitting algorithm of MPLS single label based on programmable router
HAN Lai-quan;WANG Jin-kuan;WANG Xing-wei;School of Electronic & Information;Northeastern University at Qinhuangdao;School of Information Science & Engineering;Northeastern University;
..............page:155-159
Energy efficiency analysis of broadcast and communication converged network
SHEN Cheng-jie;RUI Yun;QIAN Guo-ming;HUANG Fei;LI Ming-qi;College of Electronic Science and Engineering;Nanjing University of Posts and Telecommunications;Shanghai Advanced Research Institute;Chinese Academic of Sciences;National Mobile Communications Research Laboratory;Southeast University;
..............page:160-166
Video migration strategy based on bandwidth demand prediction and cloud resource reservation
CONG Xin;SHUANG Kai;SU Sen;YANG Fang-chun;ZI Ling-ling;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;School of Electronic and Information Engineering;Liaoning Technical University;
..............page:167-174
Novel Network Architecture
..............page:177