Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2016 Issue 3
Reliable selfish node detection algorithm for opportunistic networks
REN Zhi;TAN Yong-yin;LI Ji-bi;CHEN Qian-bin;Chongqing Key Laboratory of Mobile Communication Technology;Chongqing University of Posts and Telecommunications;
..............page:1-6
Distributed software monitoring and trustworthiness evaluation based on checkpoints
LI Zhen;TIAN Jun-feng;CHANG Zhuo;MA Xiao-xue;School of Computer Science and Technology;Hebei University;Computer Department;Hebei University;
..............page:7-19
Deep Web new data discovery strategy based on the graph model of data attribute value lists
XIAN Xue-feng;CUI Zhi-ming;ZHAO Peng-peng;FANG Li-gang;YANG Yuan-feng;GU Cai-dong;Jiangsu Province Support Software Engineering R&D Center for Modern Information Technology Application in Enterprise;Institute of Intelligent Information Processing and Application;Soochow University;School of Computer Engineering;Suzhou Vocational University;
..............page:20-32
Research on correlation noise modeling of a generalized Gamma distribution in distributed coding
LIU Jie-ping;WANG Qin-ling;HE Yue-sheng;WEI Gang;School of Electronic and Information Engineering;South China University of Technology;
..............page:33-39
Forest based data collection in MR-MC wireless sensor networks
ZHANG Wei-ping;GUO Ya-hong;WANG Meng;NI Lin-yu;LI Jin-bao;School of Computer Science and Technology;Heilongjiang University;School of Information Science and Technology;Heilongjiang University;Key Laboratory of Database and Parallel Computing of Heilongjiang Province;
..............page:40-47
Bursty topic detection method for microblog based on time series analysis
HE Min;XU Jie;DU Pan;CHENG Xue-qi;WANG Li-hong;Institute of Computing Technology;Chinese Academy of Sciences;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:48-54
Network traffic multi-step prediction based on chaos theory and improved echo state network
TIAN Zhong-da;LI Shu-jiang;WANG Yan-hong;WANG Xiang-dong;College of Information Science and Engineering;Shenyang University of Technology;
..............page:55-70
Survivability model for reconfigurable service carrying network based on the stochastic Petri net
ZHAO Liang;ZOU Hong;ZHANG Xiao-hui;National Digital Switching System Engineering and Technology Research Center;National Cyberspace Security Development Innovation Center;
..............page:71-78
Patent search and analysis supporting technology innovation
LIU Bin;FENG Ling;WANG Fei;PENG Zhi-yong;School of Computer;Wuhan University;State Key Laboratory of Software Engineering;Wuhan Uvinersity;
..............page:79-89
Optimizing demand charge of data center base on PE method
HUANG Yan;WANG Peng;XIE Gao-hui;Chengdu Institute of Computer Application;Chinese Academy of Sciences;University of Chinese Academy of Sciences;School of Computer Science and Technology;Southwest University for Nationalities;Guangzhou Wuzhou Technology Corporation;
..............page:90-97
Fast view synthesis optimization algorithm based on texture smoothness
DOU Huan;JIA Ke-bin;CHEN Rui-lin;XIAO Yun-zhi;WU Qiang;Department of Electronic Information and Control Engineering;Beijing University of Technology;Department of Electronic and Information Engineering;Hong Kong Polytechnic University;
..............page:98-106
VM migration across subnets in future internet architecture—XIA
MENG Hong-wei;CHEN Zhong;MENG Zi-qian;SONG Chuck;School of Electronics Engineering and Computer Science;Peking University;Key Laboratory of High Confidence Software Technologies Ministry of Education;MoE Key Laboratory of Network and Software Security Assurance;Peking University;School of Computer Science;Carnegie Mellon University;
..............page:107-116
Evaluation approach for network components performance using trustworthiness measurement
XIONG Gang;LAN Ju-long;HU Yu-xiang;LIU Shi-ran;National Digital Switching System Engineering & Technological R&D Center;
..............page:117-128
Cache allocation policy of service contents along delivery paths for the smart collaborative network
FENG Bo-hao;ZHOU Hua-chun;ZHANG Hong-ke;ZHANG Ming-chuan;Institute of Electronic and Information Engineering;Beijing Jiaotong University;Information Engineering College;Henan University of Science and Technology;
..............page:129-138
CBFM:cutted Bloom filter matrix for multi-dimensional membership query
WANG Yong;YUN Xiao-chun;WANG Shu-peng;WANG Xi;Institute of Information Engineering;Chinese Academy of Sciences;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:139-147
Throughput model of TCP SACK under burst losses
WANG Zhi-ming;ZENG Xiao-ping;LI Juan;LIU Xue;CHEN Li;College of Communication Engineering;Chongqing University;
..............page:148-156
Robust interference alignment algorithm for cognitive MIMO interference network
ZHU Shi-lei;ZHOU You;REN Xiu-kun;HU Han-ying;Institute of Navigation and Space Target Engineering;PLA Information Engineering University;Information Technology Research Institute;PLA Information Engineering University;
..............page:157-164
Vector space embedding of DNS query behaviors by deep learning
ZHOU Chang-ling;LUAN Xing-long;XIAO Jian-guo;Computer Center;Peking University;School of Electronics Engineering and Computer Science;Peking University;Institute of Computer Science & Technology;Peking University;
..............page:165-174
Tone reservation technique combined with active constellation extension for PAPR reduction of OFDM signal
LIU Fang;WANG Yong;State Key Lab of Integrated Service Networks;Xidian University;
..............page:175-181
Key nodes discovery in network graph based on Graphlab
GAO Zhuang-liang;LYU Yan-fei;ZHANG Hong;School of Computer Science and Engineering;Beihang University;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:182-189
Research on(t, k)-diagnosability for exchanged hypercube network
XIONG Xi;LIANG Jia-rong;MA Qiang;School of Computer and Electronic Information;Guangxi University;
..............page:190-198