Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2015 Issue 3
Personalized trajectory privacy preserving method based on graph partition
YANG Jing;ZHANG Bing;ZHANG Jian-pei;XIE Jing;College of Computer Science and Technology;Harbin Engineering University;
..............page:5-15
Resource assignments algorithm based on energy efficiency optimization in OFDM relay networks
LI Yun;DUAN Hai-xia;SU Kai-rong;CAO Bin;Chongqing Key Lab of Mobile Communications Technology;Chongqing University of Posts and Telecommunications;National Key Laboratory of Science and Technology on Communications;University of Electronic Science and Technology of China;
..............page:16-23
Joint transceiver beamforming in MIMO cognitive radio network
GUO Yan;ZHU Fang-jun;LI Ning;YUAN Xiao-yun;College of Communications Engineering;PLA University of Science and Technology;
..............page:24-32
Modeling and analysis of Cloud-P2P storage architecture
JIN Shun-fu;WANG Chen-fei;CHEN Ling-ling;HUO Zhan-qiang;School of Information Science and Engineering;Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;The China United Network Communications Co.;Ltd.;Qinhuangdao Branch;College of Computer Science and Technology;Henan Polytechnic University;
..............page:33-40
Coding redundancy controlled data forwarding mechanism in opportunistic networks
WU Da-peng;LOU Peng-wen;LIU Qiao-shou;XIONG Yu;WANG Ru-yan;Broadband Ubiquitous Network Research Laboratory;Chongqing University of Posts and Telecom.;
..............page:41-52
Energy efficient cooperative spectrum sensing algorithm in cognitive wireless sensor networks
YU Gui-cai;LONG Cheng-zhi;XIANG Man-tian;Faculty of Information Engineering;Nanchang University;
..............page:53-63
Key distribution and recovery algorithm based on Shamir’s secret sharing
RONG Hui-gui;MO Jin-xia;CHANG Bing-guo;SUN Guang;LONG Fei;College of Computer Science and Engineering;Hunan University;Department of Information Management;Hunan University of Finance and Economics;Department of Economics and Management;Changsha University;
..............page:64-73
Analysis of influence of ionosphere and troposphere model on RAIM availability of COMPASS
JIAO Wei-dong;TANG Zhi-hu;SHEN Xiao-yun;Tianjin Key Lab for Advanced Signal Processing;Civil Aviation University of China;
..............page:74-81
Avaliability model for reconfigurable network
ZHAO Liang;ZHANG Xiao-hui;WANG Yu;National Digital Switching System Engineering and Technology Research Center;
..............page:82-89
Cooperative caching scheme based on the minimization of total cost for P2P caches
LIU Yin-long;WANG Min;MA Wei;ZHOU Xu;HU Ya-hui;Institute of Information Engineering;Chinese Academy of Sciences;School of Information;Beijing City University;
..............page:90-97
Algorithm for blind separation of PCMA based on CHASE decoding
DU Jian;GONG Ke-xian;PENG Hua;Institute of Information Engineering;Information Engineering University;
..............page:98-103
Side channel attack of cipher chips based on difference variability
ZHANG Yang;CHEN Kai-yan;LI Xiong-wei;CHEN Jun-guang;LI Yan;Department of Information Engineering;Ordnance Engineering College;
..............page:104-109
Secure localization scheme against wormhole attack for wireless sensor networks
CHEN Hong-long;WANG Zhi-bo;WANG Zhi;XU Jiang-ming;LI Yan-jun;LIU Li-ping;College of Information and Control Engineering;China University of Petroleum;Computer School;Wuhan University;State Key Laboratory of Industrial Control Technology;Zhejiang University;China Petro Tarim Qilfield Company;College of Computer Science and Technology;Zhejiang University of Technology;School of Electrical Engineering and Automation;Tianjin University;
..............page:110-117
Cooperative transmission scheme of relay selection combined with network coding and its performance analysis
JI Bao-feng;SONG Kang;WANG Yi;HUANG Yong-ming;YANG Lv-xi;Information Engineering College;Henan University of Science and Technology;School of Information Science and Engineering;Southeast University;
..............page:118-128
Security analysis and improvement of a certificateless signcryption scheme
ZHAO Zhen-guo;School of Water Conservancy;North China University of Water Resources and Electric Power;
..............page:129-134
Towards load adaptive routing based on link critical degree for delay-sensitive traffic in IP networks
YANG Yang;YANG Jia-hai;WANG Hui;LI Chen-xi;WANG Yu-ding;Institute for the Network Sciences and Cyberspace;Tsinghua University;Tsinghua National Laboratory for Information Science and Technology;Information Management Center;Xi’an Communication Institute;
..............page:135-145
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS
GAO Sheng;MA Jian-feng;YAO Qing-song;SUN Cong;School of Computer Science and Technology;Xidian University;
..............page:146-154
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
HUANG Yong-feng;DONG Yong-qiang;ZHANG San-feng;WU Guo-xin;School of Computer Science and Engineering;Southeast University;Key Laboratory of Computer Network and Information Integration;Ministry of Education;Southeast University;
..............page:155-166
Reasearch on network delay of Internet
LIN Chuan;ZHAO Hai;BI Yuan-guo;JIA Si-yuan;College of Information Science and Engineering;Northeastern University;
..............page:167-178
Low complexity acquisition algorithm for GPS signals with low SNR and high dynamic
XIONG Zhu-lin;LIU Ce-lun;AN Jian-ping;XIE Ze-bin;School of Information and Electronics;Beijing Institute of Technology;
..............page:179-184
Source-controlled OpenFlow data plane
WANG Zhe;LIANG Man-gui;JI Xiao-meng;Fillipus Mateus Abisai;Institute of Information Science;Beijing Jiaotong University;Beijing Key Laboratory of Advanced Information Science and Network Technology;
..............page:185-191
Flow-awared identification model of sophisticated network application
ZHANG Luo-shi;WANG Da-wei;XUE Yi-bo;School of Computer Science and Technology;Harbin University of Science and Technology;National Computer Network Emergency Response Technical Team/Coordination Center of China;Research Institute of Information and Technology;Tsinghua University;National Lab for Information Science and Technology;Tsinghua University;
..............page:192-200
Recognition of PQ stego images based on identifiable statistical feature
LU Ji-cang;LIU Fen-lin;LUO Xiang-yang;ZHANG Yi;School of Navigation and Aerospace Engineering;Zhengzhou Information Science and Technology Institute;State Key Laboratory of Mathematical Engineering and Advanced Computing;School of Cyberspace Security;Zhengzhou Information Science and Technology Institute;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:201-210
Study of the ternary correlation quantum-behaved PSO algorithm
WU Tao;CHEN Xi;YAN Yu-song;Department of Computer Science;Chengdu University of Information Technology;School of Computer Science & Technology;Southwest University for Nationalities;School of Computer Science & Technology;Southwest Jiaotong University;
..............page:211-218
Nonlinear companding transform for PAPR reduction in lattice-OFDM system
PENG Si-ming;SHEN Yue-hong;YUAN Zhi-gang;MIAO Yu-wei;JIAN Wei;College of Communications Engineering;PLA University of Science and Technology;Communication Network Technique Management Centre of Jinan Ministry Region;
..............page:219-226
Blind Turbo equalization algorithm based on hidden Markov model for continuous phase modulation signals
ZHONG Kai;PENG Hua;GE Lin-dong;Institute of Information System Engineering;Information Engineering University of PLA;
..............page:227-235
Coherent parameters estimation and coherent performance analysis for distributed aperture coherent radar
SONG Jing;ZHANG Jian-yun;ZHANG Wen-gang;Electronic Engineering Institute;
..............page:236-244
Research on the method of virtual machine deployment in cloud computing
ZHANG Xiao-yan;WANG Min-ne;DU Xiao-feng;School of Software Engineering;Beijing University of Posts and Telecommunications;School of Computer;Beijing University of Posts and Telecommunications;
..............page:245-252
Link-first based quick coordinated virtual network embedding algorithm
XIONG Wen-cheng;WANG Ying;QIU Xue-song;LI Wen-jing;State Key Lab of Networking and Switching;Beijing University of Posts and Telecommunications;
..............page:253-261
Cracking-resistance net-flow fingerprint scheme based on multi-dimensional orthogonal carriers
LEI Cheng;ZHANG Hong-qi;SUN Yi;DU Xue-hui;The Third College;PLA Information Engineering University;Henan Provincial Key Laboratory of Security Information;
..............page:262-272
Design and implementation of a network measurement and analysis system in OpenFlow networks
WENG Xi;CHEN Ming;ZHANG Guo-min;XU Bo;XING Chang-you;College of Command Information Systems;PLA Univ.of Sci.& Tech.;
..............page:273-280
Improved meet-in-the-middle attack on ARIA cipher
LI Man-man;CHEN Shao-zhen;Institute of Cyberspace Security;The PLA Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;
..............page:281-286
Smart City with Big Data Analysis Technology
liu zuo ; liu yao ; zhong zuo ;
..............page:287
SDN Core Principles and Application Practice
huang zuo ; liu jiang ; wei liang ; zhang jiao ; liu yun jie ;
..............page:288