Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 1
Tone mapping based on variational model in gradient domain
XI Zhi-hong;ZHAO Lan-fei;ZHANG Chi;ZHANG Zhong-min;College of Information and Communication Engineering;Harbin Engineering University;
..............page:5-12
Performance of cellular network embedded in the cell edge with vertical coverage by co-frequency
ZHU Jin-kang;DENG Na;ZHAO Ming;Department of Electronic Engineering & Information Science;University of Science & Technology of China;
..............page:13-21
Fault localization approach for null pointer exception
JIANG Shu-juan;WANG Xing-ya;ZHANG Yan-mei;LI Wei;JU Xiao-lin;LIU Ying-qi;School of Computer Science and Technology;China University of Mining and Technology;School of Computer Science and Technology;Nantong University;
..............page:22-33
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
WU Zhi-jun;CUI Yi;YUE Meng;Tianjin Key Laboratory for Advanced Signal Processing;Civil Aviation University of China;
..............page:34-41
Social attributes aware data forwarding strategy in intermittently connected wireless networks
WU Da-peng;KONG Xiao-long;ZHANG Hong-pei;LIU Qiao-shou;XIONG Yu;WANG Ru-yan;Broadband Ubiquitous Network Research Laboratory;Chongqing University of Posts and Telecom.;
..............page:42-51
Multi-link minimum change dynamic bandwidth allocation algorithm with QoS support
LIANG Gen;YU He-wei;SUN Li-min;QIN Yong;College of Science;Guangdong University of Petrochemical Technology;Guangdong Province Key Laboratory of Petrochemical Equipment Fault Diagnosis;School of Computer Science and Engineering;South China University of Technology;School of Computer Science;Dongguan University of Technology;
..............page:52-60
Mobility model detection method based on birth and death model in DTN environment
DENG Guang-hong;CAO Wan-hua;ZHANG Jian;CHENG Xiong;FENG Li;College of Computer Science and Technology;Harbin Engineering University;Department of Scientific Research on System;Wuhan Digital Engineering Institute;
..............page:61-71
Energy-efficient optimal algorithm based on uplink multi-user very large MIMO system
HU Ying;JI Bao-feng;HUANG Yong-ming;YU Fei;YANG LV-xi;School of Information Science and Engineering;Southeast University;Institute of Electronics and Information;Jiangsu University of Science and Technology;College of Information Engineering;Henan University of Science and Technology;
..............page:72-78
Coordinate transformation based coefficients estimation algorithm for digital predistortion of RF power amplifiers
HUANG Hao;QIAN Hua;YAO Sai-jie;YANG Xiu-mei;Shanghai Institute of Microsystem and Information Technology;Chinese Academy of Sciences;Shanghai Research Center for Wireless Communications;Key Laboratory of Wireless Sensor Network & Communication;Chinese Academy of Sciences;
..............page:79-87
Cooperative spectrum sensing algorithm based on limiting eigenvalue distribution
MI Yin;LU Guang-yue;National Engineering Laboratory for Wireless Security;Xi’an University of Posts and Telecommunications;
..............page:88-93
Underwater acoustic OFDM channel equalization based on virtual time reversal mirror
YIN Yan-ling;QIAO Gang;LIU Song-zuo;Science and Technology on Underwater Acoustic Laboratory;Harbin Engineering University;College of Underwater Acoustic Engineering;Harbin Engineering University;
..............page:94-103
Research on trust measure and management for open distributed systems based on dynamic grouping
JIANG Li-ming;LIU Zhi-ming;ZHANG Kun;XU Jian;ZHANG Hong;School of Computer Science and Technology;University of South China;School of Computer Science and Technology;Nanjing University of Science and Technology;
..............page:104-114
Dynamic spectrum access method for femtocells in LTE
ZUO Xu-zhou;XIA Wei-wei;SHEN Lian-feng;National Mobile Communications Research Laboratory;Southeast University;
..............page:115-124
Blind audio watermarking mechanism based on variational Bayesian learning
TANG Xin;MA Zhao-feng;NIU Xin-xin;YANG Yi-xian;Information Security Center;Beijing University of Posts and Telecommunications;Beijing National Security Science and Technology Co.;Ltd.;
..............page:125-132
Problem of the dynamic topology architecture of rechargeable wireless sensor networks
DING Xu;HAN Jiang-hong;SHI Lei;XIA Wei;WEI Zhen-chun;School of Computer and Information;Hefei University of Technology;Engineering Research Center of Safety Critical Industrial Measurement and Control Technology;Ministry of Education;Department of Computer Science and Technology;Bengbu University;
..............page:133-145
Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
WANG Min;DU Zhi-bo;WU Zhen;RAO Jin-tao;College of Electronics and Information Engineering;Sichuan University;School of Information Security Engineering;Chengdu University of Information Technology;
..............page:146-152
Energy-aware scheduling policy for data-intensive workflow
XIAO Peng;HU Zhi-gang;QU Xi-long;Department of Computer and Communication;Hunan Institute of Engineering;School of Software;Central South University;
..............page:153-162
Improved anticipatory scheduling algorithm based on workload characteristic and service time evaluation
CHEN Jin-zhong;YAO Nian-min;CAI Shao-bin;SUN Mei-ling;College of Computer Science and Technology;Harbin Engineering University;
..............page:163-170
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
YANG Pan;GUI Xiao-lin;YAO Jing;LIN Jian-cai;TIAN Feng;ZHANG Xue-jun;School of Electronics and Information Engineering;Xi’an Jiaotong University;Shaanxi Province Key Laboratory of Computer Network;Xi’an Jiaotong University;
..............page:171-182
Distributed refinement algorithm for WSN localization
YAO Ying-biao;JIANG Nan-lan;College of Communication Engineering;Hangzhou Dianzi University;National Mobile Communications Research Laboratory;Southeast University;
..............page:183-192
Region-based lossless data hiding with high capacity for medical images
DENG Xiao-hong;CHEN Zhi-gang;LIANG Di-qing;MAO Yi-min;College of Applied Science;Jiangxi University of Science and Technology;College of Information Science and Engineering;Central South University;Mobile Medical Laboratory;Central South University;
..............page:193-202
Vehicular social network:a survey
WANG Xiang;LENG Su-peng;ZHANG Ke;LIU Hao;School of Communication and Information Engineering;University of Electronic Science and Technology of China;Beijing Municipal Transport Operation Coordinate Center;Beijing Transportation Information Center;
..............page:203-214
Multipath traffic splitting algorithm based on adaptive granularity
WANG Peng;LAN Ju-long;CHEN Shu-qiao;National Digital Switching System Engineering & Technological R&D Center;
..............page:215-221
Fractional time delay estimation method based on the minimum CIM and the Farrow structure
YU Ling;QIU Tian-shuang;Faculty of Electronic Information and Electrical Engineering;Dalian University of Technology;School of Electronic & Information Engineering;Liaoning University of Technology;
..............page:222-227
Research on relevance between k-core and clustering coefficient in complex network
LIU Jun;QIAO Jian-zhong;School of Information Science & Engineering;Northeastern University;
..............page:228-233
Checkpoint trust evaluation method based on Markov
TIAN Jun-feng;ZHANG Ya-jiao;College of Mathematics and Computer;Hebei University;
..............page:234-240
Minimum-cost network hardening algorithm based on stochastic loose optimize strategy
ZHAO Guang-sheng;CHENG Qing-feng;SUN Yong-lin;Department of Language Engineering;PLA University of Foreign Languages;College of Computer Science;National University of Defense Technology;
..............page:241-249