default search action
WCNIS 2010: Beijing, China
- Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China. IEEE 2010, ISBN 978-1-4244-5850-9
- Rui Chen, Jiandong Li, Wei Liu, Jian Li:
Inter-carrier cooperative coding/decoding for OFDM systems using geometric mean decomposition. 1-3 - Jiayan Zhang, Ma Jing, Shaochuan Wu:
Robust transmission of progressive images in the deep space communication. 4-8 - Xu Zhe, Yongsheng Wang, Florence Alberge, Pierre Duhamel:
A turbo iteration algorithm in 16QAM hierarchical modulation. 9-12 - Jian Feng Zang, Jian Cheng, Bo Liu, Qiang Yue:
Performance comparison of phase modulated system based on DSSS with HPA nonlinearity. 13-17 - Xinle Yu, Dandan Song, Zhanxin Yang:
The performance of multilevel coded 64DAPSK modulated OFDM system. 18-22 - Jinyuan Chen, Jingyang Lu:
Multi-cell and multi-user detection in uplink for MIMO systems. 23-27 - Songtao Lu, Yun Zhao:
A multipath mitigation algorithm in Global Navigation Satellite Systems arrays using Independent Component Analysis. 28-32 - Gao-ping Liu, Zi-han Zheng:
Self-adaptive algorithm for image transmission based on narrow and variable bandwidth. 33-36 - Taobin Jin, Jie Jin, Ruipu Yao, Hongmeng Ji, Yizhen Zhang:
Transmission properties study of PDGS with defected triangles. 37-40 - Weiguang Li, HuaMin Chen, Ming Chen:
Performance analysis for multiuser dual-hop decode-and-forward cooperative system over Nakagami-m fading channels. 41-44 - Guang-zhao Cui, Hao-bin Li:
The design of localization in wireless sensor network node based on JENNIC platform. 45-48 - Runping Yuan, Taiyi Zhang, Jianxiong Huang, Jing Zhang, Zhenjie Feng:
Performance analysis of opportunistic cooperative communication over Nakagami-m fading channels. 49-53 - Xiaopeng Huang:
Capacity criterion-based power loading for underwater acoustic OFDM system with limited feedback. 54-58 - Hongyan Li, Yang Liu, Dexian Zhang:
Dynamic spectrum access for cognitive radio systems with repeated games. 59-62 - Guolin Sun, Feng Ye:
A FFT-window search algorithm for diversity combining in downlink multipoint joint transmission. 63-67 - Mahdi Kashiha, Mehrdad Ardebilipour, Ehsan Soleimani-Nasab:
An adaptive method for multi-user MIMO power controlled systems. 68-72 - Die Hu, Xiaolin Zhou:
A new pilot design method for OFDM systems with virtual subcarriers. 73-77 - Zhiqiang Wu, Bin Li, Jiadong Xu:
A DSP-based underwater communication modem using electric current method. 78-82 - Ping Zhang, Jiayin Qin:
A simple channel shortening equalizer for wireless TDD-OFDM systems. 83-86 - Jupeng Ding, Zhitong Huang, Yuefeng Ji:
Indoor white light wireless data transmission based on new generation environment-friendly solid state lighting. 87-91 - Jie Song, Jianhao Hu, Zhao Wang:
Evolutionary Game Algorithm for channel estimation in Interleave-Division Multiple Access Systems. 92-97 - Zhongxun Wang, Xinqiao Yu, Xingcheng Wang, Dong Guo:
An improved IWBF decoding algorithm based on LDPC codes in the image transmission. 98-101 - Shibao Li, Wei Jia:
AODV route protocol research based on improved ERS algorithm. 102-106 - Binggang Xiao, Xiumin Wang, Jixiang Zhao:
A dual band notched ultra-wideband antenna using complementary split ring resonators. 107-109 - Binggang Xiao, Xiumin Wang, Jixiang Zhao:
A band notched ultra-wideband antenna using complementary split ring resonator. 110-112 - Binggang Xiao, Xiumin Wang, Jixiang Zhao:
Ultra-wideband antenna with frequency notch characteristic using a complementary split ring resonator. 113-115 - Zhehan Ding, N. Yamauchi:
An improvement of energy efficient multi-hop time synchronization algorithm in wireless sensor network. 116-120 - Chunjiang Yao, Xiaohu Chen, Xuping Wang, Qingfei He:
Design and implementation of signal acquisition system based on wireless transmission. 121-125 - Weiguo Guan, Zhongliang Deng, Yuetao Ge, Dejun Zou:
A practical TDOA positioning method for CDMA2000 mobile network. 126-129 - Xiang Zhang, Wenbo Wang, Shuping Chen, Chunyi Wang:
Multi-cell channel estimation and multi-cell joint detection in TD-SCDMA system. 130-134 - Gengkun Wang, Wei Xiang, John Leis, Yafeng Wang:
Design of a wireless portable vibration acquisition and analysis instrument. 135-139 - Bin Xia, Peng Zhang, Qin Guo:
Linear combination design of wavelet pulses for UWB communication system. 140-142 - Rentao Zhao, Zhifang Zhang, Jun Tie, Jun Li:
Design and implementation of mesh-based current distribution on-line monitoring system in aluminum reduction cells. 143-146 - Haizheng Guo, Bo Wang, Bangli Liang, Tad A. Kwasniewski, Robert Sobot:
Optimized LNA for analog RF front-end circuit in brain-machine interface. 147-150 - Wenbai Chen, Xiaopin Zhang, Wei Li:
An scheme improved on iterative detection algorithm for V-BLAST. 151-154 - Wei Xue, Wei-qun Ma, Bing-cai Chen:
Research on a realization method of the optimized efficient spectrum signals using Legendre series. 155-159 - Qinghua Shi, Yoshio Karasawa:
OFDM symbol detection based on frequency-domain oversampling. 160-164 - Gongpu Wang, Feifei Gao, Xuerong Gou, Chintha Tellambura:
Effects of channel estimation errors on BPSK systems using superimposed pilots. 165-168 - Lizhong Song:
Performance simulation of a kind of conformal sinuous antenna with four arms. 169-172 - Lizhong Song:
Simulation and analysis of a spherical conformal Archimedean spiral antenna. 173-177 - Xiaogang Yang, Weitao Du, Jingang Yu, Rui Lv, Zhanxin Yang:
A novel 3780-point FFT. 178-182 - Jiaqi Duan, Yong Li:
A novel cooperative spectrum sensing scheme based on clustering and softened hard combination. 183-187 - Xugang Liu, Hao Liu:
A novel half-overlap FMT system using CIC filter in cognitive radio. 188-192 - Caihua Yin, Yu Zheng, Dawei Ma, Gang Yu, Jian Wang:
Detection of the CDMA-based transform domain communication system. 193-197 - K. Vishnu:
A new kind of transport layer attack in wireless Ad Hoc Networks. 198-201 - M. Shamim Kaiser, Kazi M. Ahmed, Raza Ali Shah:
Power allocation in OFDM-based cognitive relay networks. 202-206 - Hossein Khaleghi Bizaki:
Tomlinson-Harashima precoding optimization over correlated MIMO channels. 207-211 - Hossein Khaleghi Bizaki:
Channel imperfection effects on THP performance in a slowly time varying MIMO channels. 212-216 - Keyurkumar J. Patel, S. Vijay Anand, S. P. Suman Kumar:
A robust QoS framework on Android for effective media delivery to DLNA Enabled Home gateway in smart home environment. 217-222 - Lai Xin, Zhu Yi, Zhai Hualei, Li Jun:
Research on position algorithm based on similarity for wireless Ad Hoc networks. 223-227 - Shao-Lun Huang, Yufei W. Blankenship, Lizhong Zheng:
The design of binary shaping filter of binary code. 228-232 - Caihua Yin, Dawei Ma, Yu Zheng, Gang Yu, Jian Wang:
Channel estimation and symbol demodulation of the transform domain communication system. 233-236 - Farah Haroon, Haroon Rasheed, Kazi M. Ahmed:
An adaptive srake reception of biorthogonal IR-TH UWB signals in IEEE 802.15.4a industrial NLOS environment. 237-241 - Yanliang Sun, Ricai Tian, Qiyue Yu:
Frequency domain equalization with user interference cancellation for 2-dimensional block spread CDMA system. 242-246 - Han Zhang, Xianhua Dai:
Maximum-likelihood CFO estimation for MIMO/OFDM uplink using superimposed trainings. 247-251 - Ling Chen, Thomas Ostertag, Marc Loschonsky, Leonhard M. Reindl:
Measurement of mobile radio propagation channel in ruins. 252-256 - Mohammad Dosaranian Moghaddam, Hamidreza Bakhshi, Gholamreza Dadashzadeh:
Interference management for DS-CDMA receiver through base station assignment in multipath fading channels. 257-263 - Hairol Azaha Abdul Samad, Mohd Faruzi Shaiful Azni, Mohd Fikry Abdul Karim, Mazlaini Yahya, Mohd Arif Arifen:
Rapid modeling, characterization, optimization methodology and analysis for low cost RF filter design. 264-268 - Franco Tommasi, Simone Molendini, Elena Scialpi, Catiuscia Melle:
CHARMS: Cooperative hybrid architecture for relaying multicast satellite streams to sites without a satellite receiver. 269-276 - Sondes Larafa, Maryline Laurent:
Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks. 277-281 - Haijie Wu, Yanwu Ding, Hyuck M. Kwon:
Phase synchronization for distributed sensor networks in feedback bit errors. 282-286 - Qi Ke, Dongqing Xie, Dafang Zhang:
A robust watermarking scheme for 3D point cloud models using self-similarity partition. 287-291 - Lijiang Zhang:
A provably secure authenticated key exchange protocol. 292-297 - Ning Xu, Zhen Yang, Haiyan Guo:
Voice conversion with a strategy for separating speaker individuality using state-space model. 298-301 - Jiandong Liu, Ye Tian, Shuhong Wang, Kai Yang:
A fast new one-way cryptographic hash function. 302-306 - Kamal Kumar Chauhan, Shashikala Tapaswi:
A secure key management system in group structured mobile ad hoc networks. 307-311 - Zhicai Shi, Yongxiang Xia:
A novel hidden Markov model for detecting complicate network attacks. 312-315 - Liping Ji, Yu Fan, Chuan Ma:
Covert channel for local area network. 316-319 - Arun Raaza, Amit Mehta:
Multiple beams scanning double square loop antenna for UWB communications. 320-324 - Jinsuk Baek, Cheonshik Kim, Paul S. Fisher, Hongyang Chao:
(N, 1) secret sharing approach based on steganography with gray digital images. 325-329 - Lili Li, Xiangzhong Fang:
New detection scheme for spread spectrum audio watermarking. 330-334 - Zhen-Wu Wang:
A generic access control model based on ontology. 335-339 - Hongmin Cai, Naiqi Wu:
Design and implementation of a DIDS. 340-342 - Mohamed Hamdi, Noureddine Boudriga:
Content-based network filtering of encrypted image data. 343-348 - Roman Schlegel, Duncan S. Wong:
An efficient routing protocol for anonymous networks. 349-353 - Junling Ren:
Information hiding algorithm for palette images based on HVS. 354-358 - Jin-ye Liu, Lize Gu, Shoushan Luo, Yixian Yang:
An anonymous authentication scheme for mobile communication. 359-364 - Ming Wan, Nan Yao, Ying Liu, Hongke Zhang:
A fast information reproduction method for HTTP in WLAN. 365-369 - Kiwoon Sung, Suman Srinivasan, Henning Schulzrinne:
BBS-ONE: Bulletin board and forum system for mobile opportunistic networks. 370-375 - Deepak Subramanian, Ha-Thanh Le, Peter Kok Keong Loh, Annamalai Benjamin Premkumar:
An empirical vulnerability remediation model. 376-380 - Ying Li, Lu-Sheng Chen:
Multi-conditional e-Cash with transferability. 381-385 - Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo:
A method for topology conformance tests under logical constraints. 386-390 - Jianfeng Wang, Xiaorong Zhao:
A new approach for image retrieval with integrated Euclidean distance and rotational correlation. 391-395 - Tinghai Yue:
The characterizations of binary vector-output plateaued functions. 396-400 - Tinghai Yue:
A construction of binary vector-output plateaued functions. 401-405 - Shichuan Ma, Michael Hempel, Yaoqing Yang, Hamid Sharif:
A new approach to null space-based noise signal generation for secure wireless communications in transmit-receive diversity systems. 406-410 - Dawen Xu, Rangding Wang, Jicheng Wang:
Low complexity video watermarking algorithm by exploiting CAVLC in H.264/AVC. 411-415 - Xiaojun Tong, Zhangquan Zhao, Huimin Shuai, Zhu Wang:
The research of worm distributed detection technology based on network security. 416-420 - Xinde Sun, Shukui Bo:
A blind digital watermarking for color medical images based on PCA. 421-427 - Xiaoyu Wan, Zhang Li, Zi-fu Fan:
A SIP DoS flooding attack defense mechanism based on priority class queue. 428-431 - Fan Yang, Zhen-kai Wang, Jianya Chen, Yunjie Liu:
VLB-VNE: A regionalized Valiant Load-balancing algorithm in virtual network mapping. 432-436 - Xuexiu Zhu, Jianqing Qi, Weiming Zhang, Jiufen Liu:
Improving the Perturbed Quantization steganography by Modified Matrix Encoding. 437-440 - Zi-fu Fan, Zhang Yi, Xiaoyu Wan:
An improved security authentication mechanism for Parlay/OSA Framework based on SSLTLS. 441-444 - Lulu Chang, Chao Guo, Yongsheng Hu:
The analysis and research of selfish question in p2p. 445-448 - Wei Han, Jianguo Huang, Fangfei Wu:
A modified Min-Sum algorithm for low-density parity-check codes. 449-451 - Pengcheng Wei, Yingxian Zhu, Ran Wei, Xinbo Yang:
Public-key cryptosystem based on permutation rational function. 452-454 - Bo Zhou, Wei Han, Huafeng Wu:
A network security system model based on FPGA. 455-459 - Xiaonian Tang, Guijun Nian, Quan Wen, Jianchun Wang, Xiaoyan Tang:
Robust watermarking in multiwavelet domain based on average subimage of low frequency. 460-464 - Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang:
Behavior profiling for robust anomaly detection. 465-471 - Lin Mei, Xuejun Sha, Naitong Zhang:
Covert communication based on waveform overlay with Weighted Fractional Fourier Transform signals. 472-475 - Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Improved unidirectional chosen-ciphertext secure proxy re-encryption. 476-480 - Hua Jiang, Xianru Du, Yongxing Jia, Weizhi Wang:
An identity-based security mechanism for P2P VoIP. 481-485 - Guoan Zhao, Canghai Tan, Yongjun Ren, Liming Fang:
An efficient unlinkable secret handshake protocol without ROM. 486-490 - Hua Jiang, Rui Zhang, Yongxing Jia, Shanming Liu:
A distributed key management scheme based on SGC-PKC for P2P network. 491-495 - Liqin Tian, Chuang Lin:
Computation and analysis of node intending trust in WSNs. 496-499 - Xiaodong Xu, Xiao Guo, Shirui Zhu:
A queuing analysis for low-rate DoS attacks against application servers. 500-504 - George Mathew, Xiaojiang Du:
Securing multi-tiered web applications. 505-509 - Luguo Zhang, Zheng Li, Ruijiao Wang, Shengjun Wen:
Design and implementation of multiple cryptographic algorithm interface circuit based on secure SoC. 510-514 - Ling-ling Wang:
Multi-party concurrent signatures based on short ring signatures. 515-517 - Chengqing Guo, Guoai Xu, Xinxin Niu, Yixian Yang, Yang Li:
A color image watermarking algorithm resistant to print-scan. 518-521 - Haisheng Jiang, Sidong Zhang:
Research on the Multihoming Scheme in a Loc/ID split context. 522-527 - Shuying Zhang, Shufen Liu, Yue Gao, Jianmei Ge, Limin Wang:
A credible network intrusion detection system based on grid. 528-532 - Yuan Wang, Duncan S. Wong, Liusheng Huang:
One-pass key establishment for anonymous wireless roaming. 533-537 - Wesley Connell, Dan E. Tamir, Mina Guirguis:
Prime-based mimic functions for the implementation of covert channels. 538-543 - Chunlong Fan, Zhouhua Yu, Lei Xu:
Objective evaluation of Spider Detection Techniques. 544-548 - Hui-bin Wang:
A new model of formal design system of security authentication protocol. 549-552 - Todorka Alexandrova, Yoshiaki Suzuki, Kan Okubo, Norio Tagawa:
Secret images sharing scheme using two-variable one-way functions. 553-557 - Wenjian Xie, Zhang Zhang:
Efficient and provably secure certificateless signcryption from bilinear maps. 558-562 - Bo Wang, Chuanhe Huang, Wenzhong Yang, Tong Wang:
Trust opportunistic routing protocol in multi-hop wireless networks. 563-567 - Chunhui Piao, Zhenjiang Fan, Chunyan Yang, Xufang Han:
Research on RFID security protocol based on grouped tags and re-encryption scheme. 568-572 - Tao He, Hao Zhong:
Periodic sequence in netflow recognizing algorithm. 573-576 - Jingdong Sun, Yibin Zhang:
Railway passenger dynamic E-business based on Web services and RFID. 577-581 - Jimei Wang, Guochu Shou, Yihong Hu, Zhigang Guo:
High-speed architectures for GHASH based on efficient bit-parallel multipliers. 582-586 - Zhi-min Dai, Lu Guo:
Growth customer information mining analysis with association rules in On-line financial Web site. 587-591 - Jianxin Fu, Lianfen Huang, Yan Yao:
Application of BP neural network in wireless network security evaluation. 592-596 - Weifeng Chen, Jianchun Jiang, Nancy Skocik:
On the privacy protection in publish/subscribe systems. 597-601 - Lihua Liu, Zhengjun Cao:
Improvement of one escrow-free identity-based signature. 602-606 - Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang:
Combating self-learning worms by using predators. 607-611 - Zhijie Zhang, Fang Yuan:
Compressed video copy detection based on texture analysis. 612-615 - Wei-wei Xia, Hai-feng Wang:
Prediction model of network security situation based on regression analysis. 616-619 - Chunlei Wang, Yan Wen, Yiqi Dai:
A software vulnerability analysis environment based on virtualization technology. 620-624 - Dehe Xu, Qisheng Wang:
The study of watermarking algorithm for vector geospatial data based on the phase of DFT. 625-629 - Wenhui Lu, Zheying Zhang, Jyrki Nummenmaa:
A generic data model with a decomposition operation for DRM interoperability. 630-634 - Christopher Kunz, Jan Wiebelitz, Matthew Smith:
An attack-resilient Grid auditing infrastructure. 635-639 - Yusong Du, Dingyi Pei:
Count of annihilators of Boolean functions with given algebraic immunity. 640-643 - Christian Schridde, Tim Dörnemann, Ernst Juhnke, Bernd Freisleben, Matthew Smith:
An identity-based security infrastructure for Cloud environments. 644-649 - Gyözö Gódor, Norbert Giczi, Sándor Imre:
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations. 650-657 - Sheng Yu, Shijie Zhou, Sha Wang:
Fast-flux attack network identification based on agent lifespan. 658-662 - Qiongqiong Wang, Mingjun Xin:
Research on a secure mobile payment based on multi-agents. 663-666 - Zhen Chen, Fachao Deng, An'an Luo, Xin Jiang, Guo-Dong Li, Run-hua Zhang, Chuang Lin:
Application level network access control system based on TNC architecture for enterprise network. 667-671 - Yi Tang, Yuanyuan Wu, Quan Zhou:
AASC: Anonymizing network addresses based on subnet clustering. 672-676 - Xue Yuan:
Biometric verification using hand vein-patterns. 677-681 - Alex K. Ohoussou, Hai Jin, Deqing Zou, Feng Zhao, Guofu Xiang, Ge Cheng:
Autonomous agent based intrusion detection in virtual computing environment. 682-686 - Zhitao Guan, Jietao He, Kehe Wu, Shuai Yuan:
Research on a Behavior-based active controllable defense model and its application. 687-691 - Sunghyuck Hong, Sunho Lim:
Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study. 692-696 - Zhenyi Luo, Jiying Zhao:
Wideband audio over narrowband based on digital watermarking. 697-701 - Myoung-Hoon Lee, Vincent So, Jiying Zhao:
A key-code watermarking algorithm for video content protection. 702-706 - Shaneel Narayan, Shailendra S. Sodhi, Paula Raymond Lutui, Kaushik J. Vijayakumar:
Network performance evaluation of routers in IPv4/IPv6 environment. 707-710 - Changlong Chen, Min Song, George Hsieh:
Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. 711-716 - Zhi-Dong Shen, Xiaoping Wu, Jing Zhan:
Trust management for mobile agent system based on trusted computing platforms. 717-721 - Muhammad Aamir Saleem Choudhry, Muhammad Zubair, Ijaz Mansoor Qureshi:
Particle swarm optimization based MUD for overloaded MC-CDMA system. 1-5 - Bin Chen, Peng Cai, Yong Zhang, Jian Huang, Yun-Song Wu, Jun Tang:
Research on autocorrelation of chaotic sequence by phase space method. 6-12 - Hongbo Yuan, Dapeng Zhang, Zhao Jin:
A combination scheme for serial turbo code and differential unitary space-time modulation. 13-16 - Zhiheng Zhou, Liang Zhou:
Network joint coding-aware routing for wireless ad hoc networks. 17-21 - Shengjian Chen, Lei Xu:
A boundary-scan test bus controller design for mixed-signal test. 22-25 - Monika Pinchas:
A new closed approximated formed expression for the achievable residual ISI obtained by adaptive blind equalizers for the noisy case. 26-30 - Hailong Zhao, Xianglu Li, Jian Zhang, Jie Zhou:
A novel frequency tracking algorithm in high dynamic environments. 31-34 - Wanlu Sun, Wei Yang, Lihua Li:
A simple channel estimation method in MIMO-OFDM systems with virtual subcarriers. 35-39 - Ahmed Abdul Quadeer:
Enhanced equalization in OFDM systems using cyclic prefix. 40-44 - Qiuyan Liu, Zhangdui Zhong, Bo Ai:
A unified approach to the unilateral bounds of interference performance. 45-49 - Zhuo Wang, Lizhi Wang, Yong Yang:
Remove multifrequency mixture noise in processing of Wireless Communication wave/radar reflect signal by method of ICA. 50-53 - Chunyun Song, Jianmin Xu, Yi Zhan:
A method for specific emitter identification based on empirical mode decomposition. 54-57 - Lili Li, Xiangzhong Fang:
Adaptive detection for spread spectrum audio watermarking. 58-62 - Xiaojun Liu, Congfeng Liu, Guisheng Liao:
Improved pattern synthesis method with linearly constraint minimum variance criterion. 63-66 - Jie Zhuo, Chao Sun, Yixin Yang, Bing Li:
Joint signal detection and recovery via Blind Signal Separation. 67-71 - Shuyuan Zhu, Jeff Siu-Kei Au-Yeung, Bing Zeng:
DCT-domain translation for composing better pictures in the MDSQ-based multiple description video coding. 72-76 - Xin Hu, Gang Wang, JiRun Luo, Zhicheng Wang:
A type of TWTA predistortion linearizer for space telecommunication applications. 77-79 - Liang Dai, Xuekang Sun, Hao Chen:
A new Selective Signal Detection based on Iterative Joint Channel Estimation in MIMO-OFDM systems. 80-84 - Cheng Zhou, Ruimin Hu, Heng Wang:
A higher-order prediction method of spatial cues based on Bayesian Gradient model. 85-89 - Jilong Li, Na Di, Ming Yang, Zhiyong Wu:
Construction of quasi cyclic LDPC with ACE constraint. 90-93 - Xie Xiao-Chun:
Compressive sensing based measurement of time-frequency shifts system. 94-97 - Shuai Zhang, Jianping Li, Chaoshi Cai:
An average-entropy-value-based stopping criterion for BICM-ID. 98-101 - Jeff Siu-Kei Au-Yeung, Shuyuan Zhu, Bing Zeng:
Quality assessment for a perceptual video encryption system. 102-106 - Mu-Liang Wang, Mn-Ta Lee:
A neural network based coding mode selection scheme of hybrid audio coder. 107-110 - Weihua Zhang, Zhonghui Wei, Xin He, Peiyu Qiao, Guolong Liang:
The design of high speed image acquisition system over Gigabit Ethernet. 111-115 - Zujue Chen, Jie Cao, Shaoqing Liu:
A fast motion estimation optimization for H.264/AVC encoder. 116-119 - Lijun Zhang, Yao Zhao, Bo Ye, Min Luo:
An Ethernet over SONET/SDH mapping chip and its path protection switching Implementation. 120-123 - Zhongxun Wang, Xingcheng Wang, Xinqiao Yu, Dong Guo:
A BP decoding algorithm based on nodes residual for LDPC codes. 124-127 - Wen Leng, Anguo Wang:
Increase channel capacity in MIMO system by adjusting the axial ratio of circular polarized antenna. 128-131 - Kewu Huang, Ran Tao, Yue Wang:
Study of frequency domain equalization for chirp spread spectrum systems. 132-136 - Kok Ann Donny Teo, Shuichi Ohno, Takanori Ishii:
Turbo equalization and channel re-estimation in OFDM over doubly-selective channel. 137-141 - Dechen Xu, Zhiwen Liu, Yougen Xu, Jinliang Cao:
A unitary transformation method for DOA estimation with uniform circular array. 142-145 - Zhang Yi, Yao Fu-qiang:
Optimal noncoherent frequency detection of differential frequency hopping signal. 146-149 - Qi Cheng:
Exploitation of known short and long symbols for carrier frequency offset estimation in OFDM wireless LAN systems. 150-153 - Lei Zhang, Weibing Xu, Haibo Wang:
The upper bounds of punctured ring convolutional coded continuous phase modulation. 154-157 - Qunchao Feng, Yuanzhi Chen, Weitao Du:
An improved feedback cancelling method for on-channel repeater. 158-161 - Du-juan Li, Jian-dong Zhang, Bin Liu:
Periodic message-based modeling and performance analysis of AFDX. 162-166 - Lan Ma, Hanming Yan, Zonghui Jin:
The secure approach of accessing to the kernel database in state key information system. 167-172 - Lan Ma, Gang Li, Wei Gao:
State observer based adaptive information assurance evaluation model. 173-178 - Hsien-Tsai Wu, Chun-Ho Lee, Chun-Erh Chen, An-Bang Liu:
Predicting arterial stiffness with the aid of ensemble empirical mode decomposition(EEMD) algorithm. 179-182 - Jinhe Zhou, Tonghai Wu, Junmin Leng:
Research on voice codec algorithms of SIP phone based on embedded system. 183-187 - PengYu Qiu, Dan Xu, Zhi-Tao Huang, Wenli Jiang:
Blind spreading sequence set estimation of the M-ary direct sequence spread spectrum signals. 188-191 - Li Yang, Martin Tomlinson, Marcel Ambroze:
Decoding low-density parity-check codes with error-floor free over the AWGN channel. 192-196 - Fan Yang, Shenghua Dai:
A single-chip solution for railway frequency-shift signal detection. 197-201 - Mubarak Jibril, Martin Tomlinson, Mohammed Zaki Ahmed, Cen Tjhai:
Improvements on codes in non binary fields using generalised algebraic geometry codes. 202-205 - Yanyong Su, Huaming Wu, Yuanyuan Xu:
Reducing PAPR based on constellation mapping & fast algorithm. 206-210 - Ning An, Bingbing Li, Min Huang:
Research on modulation classification using empirical mode decomposition method. 211-214 - M. Saadeq Rafieee, Ali Akbar Khazaei:
A novel model characteristics for noise-robust Automatic Speech Recognition based on HMM. 215-218 - Fawwaz J. Jibrael, Wafaa S. Mummo, Mahmoud T. Yaseen:
Multiband cross fractal dipole antenna for UHF and SHF applications. 219-223 - Songyin Dai, Tao Wu, Sijie Yuan:
Particle filtering for blind equalization using the optical importance function. 224-228 - Youwei Sun, Rong Chen, Guangning Xu:
The constitution of the transmission network for the next generation cable digital TV signals. 229-233 - Miao Yu, Jianzhong Chen, Shiju Li:
Average filtered blind separation of DS-CDMA signals with ICA method. 234-237 - Miao Yu, Shiju Li, Jianzhong Chen:
Convergence characteristics analysis on blind separation of DS-CDMA signals with ICA method. 238-242 - Ming-Qiu Wang, Shu-Tao Xia, He-Guang Su, Laizhong Cui:
A quantization schema with negligible degradation for LDPC decoder. 243-247 - Liquan Zhao, Yanfei Jia:
Interharmonic estimation based on complex valued independent component analysis. 248-251 - Shanshan Li, Jinguang Jiang, Jiake Wang, Xu Gong, Qingyun Li:
A new current-mode active-only universal filter using CCCIIs. 252-255 - Yanxia Liang, Jiawei Yang, Ye Li:
A Multimode Multi-Band Excitation with Linear Prediction vocoder. 256-259 - Joan Bas, Ismael Gutiérrez, Alain Mourad:
Performance of NB-LDPC and DBTC codes with channel estimation and SNR mismatch. 260-264 - Necmi Taspinar, Muhammet Nuri Seyman:
Back propagation neural network approach for channel estimation in OFDM system. 265-268 - D. Y. Hu, Morris M. Z. Wang, Francis Chung-Ming Lau, Qi-Cong Peng:
On the design of low complexity decoding (LCD) network codes. 269-273 - Farid Samsami Khodadad, S. B. Hoseini Karani, A. Safaei, M. Hadi Karami Ata, Ali Taheri:
The direction of arrival estimation in DS-CDMA systems employing the code-matched filters and parallel ESPRIT algorithms. 274-279 - Raghunadh K. Bhattar, K. R. Ramakrishnan, Kankar S. Dasgupta:
On computation of minimum distance of linear block codes above 1/2 rate coding. 280-284 - Rui Zhan, Jürgen Lindner:
Noncoherent space-frequency coding through large-scale optimization and efficient detection. 285-289 - Hongying Shan, Lili Su, Songyan Pan, Shubin Ge, Libin Zhang:
Simulation analysis of error correction method of headlamp detection based on driving direction. 290-294 - Hongying Tang, Wen Chen:
Diversity-multiplexing tradeoff analysis for wireless multicast systems with Amplify-and-Forward scheme. 295-300 - Mohammad Rahimi, Reza Safabakhsh:
Adaptation of sampling in target tracking sensor networks. 301-305 - Yue Yao, Yong Fan, Haiyan Luo:
A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks. 306-310 - Xin Su:
A comparative survey of routing protocol for vehicular sensor networks. 311-316 - Xiaomeng Huang, Nan Jiang, Jinzhe Yang:
A cross-layer flow control algorithm over HSDPA networks. 317-321 - Frank Yeong-Sung Lin, Cheng-Ta Lee, Li-Yi Lin:
An efficient time slot allocation algorithm in wireless networks. 322-328 - Qiao Luo, Jing Chen, Chonghui Huang, Guirong Chen:
Study of MANET routing evaluation model based on Best-First. 329-332 - Chungang Yang, Jiandong Li:
Dynamic resource management mechanism design for heterogeneous networks under IEEE1900.4 framework: A network utility maximization perspective. 333-337 - Nikolaos Bogonikolos, Georgios Mantas, Giorgos Kostopoulos:
ARATOS: An intelligent machine-to-machine framework for services based on satellite Earth Observation data. 338-342 - You-fu Jiang, Guanghui Wang, Hai-yang Jin:
Dual-channel power controlled backoff based on geographic location in Ad Hoc networks. 343-348 - Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga:
A new tracking-aware gossiping scheme for Wireless Sensor Networks. 349-354 - Yanbin Huang, Shoubao Yang, Da Teng, Weiqing He, Lihua Xie:
A Fair Rate-Balance link Scheduling in WiMAX Mesh network. 355-359 - Xiao Yi, Yu Liu, Lu Deng:
A novel environment self-adaptive localization algorithm based on RSSI for wireless sensor networks. 360-363 - Yuntao Zhu, Junshan Zhang, Kautilya Partel:
Stochastic location-aided routing for mobile ad-hoc networks. 364-370 - Kiwoon Sung, Suman Srinivasan, Henning Schulzrinne:
BBS-ONE: Bulletin board and forum system for mobile opportunistic networks. 371-376 - Xiaoqiang Su, Hong Ni:
A HPMM method for increasing mobile downloading speed. 377-381 - Xiaofu Ma, Yu Fang, Xingzhen Bai:
A balanced energy consumption clustering algorithm for heterogeneous energy wireless sensor networks. 382-386 - Zhe Ding, Yubin Xu:
A novel spatial Dynamic Spectrum Allocation in the urban heterogeneous scenario. 387-391 - Zemin Ma, Jinhe Zhou, Tonghai Wu:
A cross-layer QoS scheme for MPEG-4 streams. 392-396 - Yejun Liu, Qingyang Song, Lei Guo, Xingwei Wang:
A novel QoS-oriented packet scheduling algorithm for mixed services in the downlink of OFMDA system. 397-402 - Shin-Jer Yang, Sao-Uen Chen:
QoS-based fast handover scheme for improving service continuity in MIPv6. 403-408 - Shiqiang Wang, Qingyang Song, Jianxin Feng, Xingwei Wang:
Predicting the link stability based on link connectivity changes in mobile ad hoc networks. 409-414 - Zhiming Zhang, Changgen Jiang, Jiangang Deng:
A secure anonymous path routing protocol for wireless sensor networks. 415-418 - Nedal Ababneh:
Evaluation of On/Off scheduling protocols for ad hoc and sensor networks. 419-423 - Frank Yeong-Sung Lin, Cheng-Ta Lee, Yen-Yi Hsu:
An energy-efficient algorithm for object tracking in Wireless Sensor Networks. 424-430 - Cao Huang, Falin Liu:
A distributed class-based alternative routing under a congestion control architecture for LEO satellite networks. 431-435 - Shunfu Jin, Wuyi Yue:
Performance evaluation of self-similar traffic in multimedia wireless communication networks with power saving class type III in IEEE 802.16e. 436-440 - Ling Chen, Bing Wu, Zhiwei Hu, Jiahong Liang:
Characterizing protocol interaction using metamodeling methodology. 441-445 - Adrian-Valentin Nedelcu, Doru Talaba, Vlad Cristian Stoianovici, Mihai Machedon-Pisu, Iuliu Székely:
Conceptual integration of wireless sensor networks with 3D virtual environments. 446-450 - Zhen-Guo Yang, Liusheng Huang, Mingjun Xiao, Wang Liu:
Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint. 451-455 - Zhuyan Zhao, Jianhong Mu, Hao Guan:
Characterizing the end-to-end throughput in WMN using multiple directional antennas. 456-460 - Cheng-Ta Lee, Frank Yeong-Sung Lin:
Boundary monitoring algorithms for wireless sensor networks of grouping capabilities. 461-467 - Wenping Chen:
VANETs-based real-time traffic data dissemination. 468-472 - Chiu-Kuo Liang, Chih-Hsuan Lee, Jian-Da Lin:
Steiner trees grid routing protocol in wireless sensor networks. 473-477 - Lun Tang, Huan Wang, Qianbin Chen:
Power allocation with min-max fairness for cognitive radio networks. 478-482 - Wenjing Yang, Xinyu Yang, Guozheng Liu, Wei Yu:
An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs. 483-487 - Yong Bai, Wencai Du, Zhengxin Ma, Chong Shen, Youling Zhou, Baodan Chen:
Emergency communication system by heterogeneous wireless networking. 488-492 - Lucas Dias Palhao Mendes, Jose Marcos Camara Brito:
Effects of the use of an IEEE 802.11 Snoop Agent on TCP timeouts. 493-497 - Nedal Ababneh, Houda Labiod:
A performance analysis of VANETs routing protocols using different mobility models. 498-502 - Lixia Liu, Gang Hu, Ming Xu, Yuxing Peng:
Learning Automata based spectrum allocation in cognitive networks. 503-508 - Deguang Le, Jinyi Chang:
Tunnelling-based route optimization for Mobile IPv6. 509-513 - Wu Hao, Xiaoqiang Qiao, Zhao Hang-sheng:
A new approach to improve the spectrum sensing in distributed multi-sensor networks. 514-518 - Xun Wang, Qing-Feng Chen, Bailin Yang:
Simulation of adaptive FEC mechanism for streaming 3D models over wireless networks. 519-524 - Alireza shams Shafigh, Kamran Abdollahi, Andreas J. Kassler:
Improving performance of on demand multicast routing by using fuzzy logic. 525-529 - V. S. Anitha, M. P. Sebastian:
A connected dominating set-based weighted clustering algorithm for wireless sensor networks. 530-534 - Tianyi Xing, Yuanan Liu, Bihua Tang, Fan Wu:
Dynamic-Adjusting AODV Routing Protocol Based on Max hop count. 535-539 - Wenzhong Yang, Chuanhe Huang, Bo Wang, Zhenyu Zhang, Tong Wang:
A reliable multicast for MANETs based on opportunistic routing and network coding. 540-545 - Furaih AlShaalan, Saleh AlShebeili, Abdulkareem Adinoyi:
Interference-aware radio resource allocation techniques for OFDMA-based wireless networks. 546-550 - H. M. Savitha, Muralidhar Kulkarni:
Performance comparison of hard and soft-decision turbo coded OFDM systems. 551-555 - Chih-Shun Hsu, Yuh-Shyan Chen, Chih-En He:
An efficient dynamic adjusting MAC protocol for multichannel cognitive wireless networks. 556-560 - Jiake Wang, Jinguang Jiang, Shanshan Li, Xu Gong, Qingyun Li:
A high stability low drop-out regulator with fast transient response. 561-565 - Qing He:
A novel vertical handoff decision algorithm in heterogeneous wireless networks. 566-570 - Jing Hu, Lianfeng Shen, Yang Yang, Ruichao Lv:
Design and implementation of wireless sensor and actor network for precision agriculture. 571-575 - You-fu Jiang, Guanghui Wang, Hai-yang Jin:
A heuristic protocol combined location service in geographic ad hoc routing. 576-582 - Jiasong Mu, Kaihua Liu:
A Routing strategy based on node movement in ZigBee networks. 583-587 - Jingbo Yuan, Shunli Ding, Dan Zhang:
An energy-balancing routing protocol based on AODV. 588-592 - Jue Yang, Xinrong Li:
Design and implementation of low-power wireless sensor networks for environmental monitoring. 593-597 - Upendra Rathnayake, Henrik Petander, Maximilian Ott, Aruna Seneviratne:
Protocol support for bulk transfer architecture. 598-602 - (Withdrawn) Simulation and evaluation of routing protocols in wireless mobile Ad Hoc network. 603-607
- Chien-Ting Liu, Te-Chih Wang, Ray-I Chang, Chia-Hui Wang:
Cross-layer handoff via predictive multiple pre-registrations for QoS of mobile multimedia applications. 608-612 - Leila Mortazavi Far, Zahra Firouzi:
New algorithm for fractional channel reservation in limited fractional gurad channel policy. 613-617 - Wan Du, Fabien Mieyeville, David Navarro:
IDEA1: A SystemC-based system-level simulator for wireless sensor networks. 618-622 - Hao Wang, Zuohua Tian, Chenye Qiu:
RSP: Robust smith predictor for queue management in time-delay networks. 623-627 - Thomas H. Clausen, Ulrich Herberg:
Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2). 628-633 - Jun-Zhao Sun, Jiehan Zhou:
Querying sensor networks with extended SQL. 634-638 - Ruzhi Xu, Liwu Deng, Jian Guo:
A learning-based anomaly detection model of SQL attacks. 639-642 - Hongying Zhao, Ling Wang:
E-commerce website credible model based on fuzzy grey method. 643-646 - Zhihui Shu, Wen Chen:
Optimal power allocation in cognitive relay networks under different power constraints. 647-652 - M. H. Yazdanpanah Lari, Mohammad Jafari, Maryam Salehi, Mohsen Imanieh, Zahra Malekjamshidi:
Simulation and implementation of a fuzzy controlled charger for Ni-Cd batteries. 653-658 - Xianyong Zhang, Zhiwen Mo, Lan Shu, Fang Xiong:
Algorithms and algorithm analysis of logical OR operation of variable precision upper approximation operator and grade lower approximation operator. 659-663 - Ying Su, Latif Al-Hakim:
Assuring information quality in medical platform for U-Healthcare service. 664-668 - Jian Yu, Jianrong Wang, Xiao Liu, Mei Yu, Zheng Zhao, Yan Zhang:
Community-based trust mechanism in P2P social networks. 669-673 - Mei Yu, Jianrong Wang, Qingjie Wang, Xuan Liu, Zheng Zhao, Yan Zhang:
Semantic-based query routing in P2P social networks. 674-678 - Muhammad Imran, Mohamed F. Younis, Abas Md Said, Halabi Hasbullah:
Volunteer-instigated connectivity restoration algorithm for Wireless Sensor and Actor Networks. 679-683 - Soumaya Zirari, Philippe Canalda, François Spies:
WiFi GPS based combined positioning algorithm. 684-688
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.