Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2016 Issue 9
Detection algorithm for cache pollution attacks based on node state model in content centric networking
TANG Hong-bo;ZHENG Lin-hao;GE Guo-dong;YUAN Quan;National Digital Switching System Engineering& Technological R&D Center;
..............page:1-9
Hardware data race detection algorithm based on sliding windows
ZHU Su-xia;CHEN De-yun;JI Zhen-zhou;SUN Guang-lu;School of Computer Science and Technology;Harbin University of Technology;Postdoctoral Research Station;School of Computer Science and Technology;Harbin University of Technology;School of Computer Science and Technology;Harbin Institute of Technology;
..............page:10-19
Multi-sensor data fusion method for water quality evaluation based on interval evidence theory
ZHOU Jian;MA Chen-hao;LIU Lin-feng;SUN Li-juan;XIAO Fu;College of Computer;Nanjing University of Posts and Telecommunications;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;
..............page:20-29
Lightweight multi-coupon system for multi-merchant environments with DAA
LIU Xin;XU Qiu-liang;ZHANG Bo;School of Information Engineering;Shandong Youth University of Political Science;Key Laboratory of Information Security and Intelligent Control in Universities of Shandong;School of Computer Science and Technology;Shandong University;School of Information Science and Engineering;University of Jinan;
..............page:30-45
Location publishing technology based on differential privacy-preserving for big data services
ZHANG Lin;LIU Yan;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Key Lab of Ministry of Education Broadband Wireless Communication and Sensor Network Technology of Nanjing University of Posts and Telecommunications;
..............page:46-54
SDN based e-mail repudiation source restraining method
HAN Zhi-geng;FENG Xia;CHEN Geng;Institute of Technology;Nanjing Audit University;Jiangsu Key Laboratory of Public Project Audit;Nanjing Audit University;School of Computer Science and Technology;Anhui University;
..............page:55-67
Parallelism of multi-scale quantum harmonic oscillator algorithm
HUANG Yan;WANG Peng;CHENG Kun;LIU Feng;School of Computer Science and Technology;Huaiyin Normal University;School of Computer Science and Technology;Southwest University for Nationalities;Chengdu Institute of Computer Application;Chinese Academy of Sciences;Parallel Computing Lab;Chengdu University of Information Technology;
..............page:68-74
Analysis of physical layer secret key capacity in the uniform scattering environment
WANG Xu;JIN Liang;LIU Lu;LI Ming-liang;HUANG Kai-zhi;National Digital Switching System Engineering & Technological Research Center;
..............page:75-81
Detecting Spam albums in online social network
LYU Shao-qing;ZHANG Yu-qing;LIU Dong-hang;ZHANG Guang-hua;Information Security Research Center of State Key Laboratory of Integrated Services Networks;Xidian University;National Computer Network Intrusion Protection Center;University of Chinese Academy of Sciences;Beijing Key Laboratory of IOT Information Security Technology;Institute of Information Engineering;CAS;
..............page:82-91
Online Boosting tracking algorithm combined with occlusion sensing
WANG Ya-wen;CHEN Hong-chang;LI Shao-mei;GAO Chao;National Digital Switching System Engineering & Technology R&D Center;
..............page:92-101
Utility-based barter trade incentive scheme in opportunistic network
YAO Jian-sheng;MA Chun-guang;YUAN Qi;College of Computer Science and Technology;Harbin Engineering University;College of Computer Science;Jilin Normal University;
..............page:102-110
Research of proactive complex event processing method
GENG Shao-feng;WANG Yong-heng;LI Ren-fa;ZHANG Jia;College of Information Science and Engineering;Hunan University;College of Computer Engineering;Jimei University;
..............page:111-120
Performance analysis of broadband self-interference cancellation at RF domain in co-frequency co-time full duplex systems
WANG Jun;ZHAO Hong-zhi;MA Wan-zhi;TANG You-xi;QING Chao-jin;National Key Lab of Science and Technology on Communication;UESTC;School of Electrical and Information Engineering;Xihua University;
..............page:121-130
Compressive sensing based data gathering algorithm over unreliable links in WSN
ZHANG Ce;ZHANG Xia;LI Ou;MEI Guan-lin;HAN Zhe;ZHANG Da-long;LIU Guang-yi;School of Information Systems Engineering;PLA Information Engineering University;School of Information Engineering;Zhengzhou University;
..............page:131-141
Survey on data preserving for the search of internet of things
WANG Jia-hui;LIU Chuan-yi;FANG Bin-xing;School of Computer Science;Beijing University of Posts and Telecommunications;Harbin Institute of Technology;Electronic and Information Engineering Institute;Dongguan University of Electronic Science and Technology;
..............page:142-153
Review and perspective on encrypted traffic identification research
PAN Wu-bin;CHENG Guang;GUO Xiao-jun;HUANG Shun-xiang;School of Computer Science and Engineering;Southeast University;Key Laboratory of Computer Network and Information Integration of Ministry of Education;Southeast University;
..............page:154-167
Analysis of stability condition for LDPC codes and optimizing degree sequences over mixed channel
SUN Kang-ning;MA Lin-hua;RU Le;FAN Wen-tong;HU Xing;HUANG Shao-cheng;Aeronautics and Astronautics Engineering College;Air Force Engineering University;State Key Laboratory of Integrated Services Networks;Xidian University;PLA 94626 Troops;
..............page:168-174
DiffPRFs: random forest under differential privacy
MU Hai-rong;DING Li-ping;SONG Yu-ning;LU Guo-qing;National Engineering Research Center of Fundamental Software;Institute of Software;Chinese Academy of Sciences;
..............page:175-182
Sensor fault detection algorithm based on credibility and neighbor-cooperation
LIN Yan-fei;SHAO Su-jie;ZHONG Cheng;GUO Shao-yong;QIU Xue-song;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;Power Grid of Hebei Province;
..............page:183-190