Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 2
Unified classification methods for determinate nonstationary signals and random nonstationary signals
WANG Hong-yu;QIU Tian-shuang;Faculty of Electronic Information and Electrical Engineering;Dalian University of Technology;
..............page:5-14
Power control strategy with joint of multi-packet reception and fuzzy logic control
HAN Jiang-hong;HU Song-hua;LIU Bin;CHEN Zhen;LIU Lei;School of Computer & Information;Hefei University of Technology;School of Electrical Engineering & Automation;Henan Polytechnic University;
..............page:15-23
Passive UHF tag collision resolution on PHY layer
WU Hai-feng;ZENG Yu;School of Electrical and Information Technology;Yunnan University of Nationalities;
..............page:24-32
New construction of secure range query on encrypted data in cloud computing
WANG Shao-hui;HAN Zhi-jie;CHEN Dan-wei;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Network and Data Security Key Laboratory of Sichuan Province;School of Computer and Information Engineering;Henan University;
..............page:33-41
Node localization scheme in wireless sensor networks under beacon drifting scenes
ZHAO Xiao-min;ZHANG Hai-yang;JIN Yan;CHEN Qing-zhang;Department of Computer Science and Technology;Zhejiang University of Technology;
..............page:42-51
Certificateless-based efficient aggregate signature scheme with universal designated verifier
ZHANG Yu-lei;ZHOU Dong-rui;LI Chen-yi;ZHANG Yong-jie;WANG Cai-fen;College of Computer Science and Engineering;Northwest Normal University;Gansu Health Vocational College;
..............page:52-59
Safe and secure classification protocol in two-tiered sensor networks
LI Rui;LI Jin-guo;CHEN Hao;College of Information Science and Engineering;Hunan University;College of Computer Science and Technology;Shanghai University of Electric Power;
..............page:60-71
Community detection algorithm based on local affinity propagation and user profile
GUO Kun;GUO Wen-zhong;QIU Qi-rong;ZHANG Qi-shan;College of Mathematics and Computer Science;Fuzhou University;Management School;Fuzhou University;
..............page:72-83
Measuring and analyzing node families in the Tor anonymous communication network
WANG Xiao;FANG Bin-xing;LIU Pei-peng;GUO Li;SHI Jin-qiao;Institute of Computing Technology;Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;Graduated University of Chinese Academy of Sciences;Chinese National Engineering Laboratory for Information Security Technologies;National Computer Network Emergency Response Technical Team/Coordination Center;
..............page:84-91
Anonymous aggregator election protocol for wireless sensor networks
FU Shuai;MA Jian-feng;LI Hong-tao;JIANG Qi;School of Computer Science and Technology;Xidian University;Science and Technology on Communication Information Security Control Laboratory;
..............page:92-101
Research on fractional repetition codes based on group divisible designs
ZHU Bing;LI Hui;CHEN Jun;HOU Han-xu;ZHOU Tai;Institute of Big Data Technologies & Shenzhen Engineering Laboratory of Converged Network Technology;Peking University Shenzhen Graduate School;
..............page:102-109
Resource saving oriented dynamic target adaptive acquisition system in wireless sensor networks
XIAO Ke-jiang;WANG Rui;CUI Li;Institute of Computing Technology;Chinese Academy of Sciences;School of Computer and Control Engineering;University of Chinese Academy of Sciences;
..............page:110-120
New interest-sensitive and network-sensitive method for user recommendation
SHANG Yan-min;ZHANG Peng;CAO Ya-nan;Institute of Computing Technology;Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:121-129
Tight coupling approach for networked control systems from cyber physical system perspective
LIN Jin-zhi;WU Ying;WU Gong-yi;XU Jing-dong;College of Computer and Control Engineering;Nankai University;
..............page:130-140
Game-theoretical frequency reuse algorithm in Femtocell network
ZHOU Xiong;FENG Sui-li;DING Yue-hua;ZHANG Yong-zhong;School of Electronic and Information Engineering;South China University of Technology;No.7 Research Institute;China Electronics Technology Group Corporation;
..............page:141-147
Privacy preserving algorithm based on trajectory location and shape similarity
WANG Chao;YANG Jing;ZHANG Jian-pei;College of Computer Science and Technology;Harbin Engineering University;
..............page:148-161
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
CUI Bo;LIU Lu;LI Xiang-yu;JIN Liang;National Digital Switching System Engineering & Technological Research Center;
..............page:162-171
Analysis on the DOA estimation of uniform circular arrays based on compressive sensing
HUANG Lin-shu;CHA Hao;YE Hui-juan;XU Kai;Electronic Engineering College;Naval University of Engineering;
..............page:172-178
Distributed fair cooperative routing in multi-gates wireless mesh network
QIAO Hong;ZHANG Da-fang;XIE Kun;HE Shi-ming;ZHANG Ji;School of Information Science and Engineering;Hunan University;
..............page:179-189
Mergeable adaptive tile coding method
SHI Meng-yu;LIU Quan;FU Qi-ming;School of Computer Science and Technology;Soochow University;Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education;Jilin University;
..............page:190-196
Novel construction of QC-LDPC codes with modified 2-D GRS codes
ZHAO Ming;ZHANG Xiao-lin;School of Electronic and Information Engineering;Beijing University of Aeronautics and Astronautics;
..............page:197-203
Construction of ZCZ periodic complementary sequence set with flexible subsequences
LI Yu-bo;XU Cheng-qian;JING Nan;LI Gang;LIU Kai;HU Hao-chen;School of Information Science & Engineering;Yanshan University;Fujian University of Technology;
..............page:204-207
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
CHEN Zhi-wei;ZHANG Juan-mei;LI Zi-chen;Data Communication Science & Technology Research Institute;Department of Information Security;Beijing Electronic Science & Technology Institute;
..............page:208-215
Bandwidth allocation games based on network selection for video communication
WEI Shu-zhi;ZHU Qi;Jiangsu Key Laboratory of Wireless Communications;Nanjing University of Posts and Telecommunications;Key Laboratory on Wideband Wireless Communications and Sensor Network Technology of Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:216-224
Outage probability and capacity analysis of distributed MIMO systems over a composite fading channel
PENG Wen-jie;LI Yue-heng;XUE Tuan-jie;JU Mei-yan;HUANG Ping;College of Computer and Information;Hohai University;
..............page:225-233