A Structured Multi-signature Scheme Against Forgery Attack
Author(s): Wenjun Luo | Changying Li
Volume: 1
Issue: 6
Year: 2011




Defending Against LDoS Attacks Using Fair AQM
Author(s): Bianqin Wang | Shunzheng Yu
Volume: 1
Issue: 6
Year: 2011




Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks
Author(s): Yusnani Mohd Yussoff | Habibah Hashim
Volume: 1
Issue: 6
Year: 2011




A New Half-blind Algorithm of Smart Antenna for Mobile Terminal
Author(s): Yuan Li | Wei Zhang | Jia Guo
Volume: 1
Issue: 6
Year: 2011




Design and Implementation of Anti-phishing Authentication System
Author(s): Wang Binjun | Wei Yang | Yang Yanyan | Han Jia
Volume: 1
Issue: 6
Year: 2011




EEACE: Energy Efficient ACE Algorithm for Wireless Sensor Networks
Author(s): ZHANG Meiyan | ZHENG Xiaodan | CAI Wenyu
Volume: 1
Issue: 6
Year: 2011




Simulation Design of AOS Cross Layer Transmission
Author(s): Bi Mingxue | Wang Hongxia
Volume: 1
Issue: 6
Year: 2011




Positioning Algorithm for Wireless Sensor Network Based on Adaptive Genetic Algorithm
Author(s): Ting Gong | Xiuying Cao
Volume: 1
Issue: 6
Year: 2011




Joint Beam-Power Coordinative Scheduling of Neighboring Sectors in Cellular Systems
Author(s): Fei Ji | Ying Liu | Fangjiong Chen | Xiaodong Chen | Shangkun Xiong
Volume: 1
Issue: 6
Year: 2011




A Density Control Algorithm For Wireless Sensor Network
Author(s): Danyan Luo | Haiying Zhou | Zhan Zhang | Decheng Zuo
Volume: 1
Issue: 6
Year: 2011




An Epistemic Model Checking Approach to Web Service Compositions
Author(s): Xiangyu Luo | Kun Wang | Fengchai Wang
Volume: 2
Issue: 6
Year: 2012




A Source-Based Multicast Scheme in IEEE 802.16 Mesh Mode
Author(s): Mortaza Maleki | Saleh Yousefi | Ali Azarpeyvand
Volume: 2
Issue: 6
Year: 2012




A Wireless Solution to Collecting and Displaying Oil Temperature Data Based on Zigbee Network
Author(s): Cui Jingcong | Chen Lidong | Li Xunming | Huang Chunhai
Volume: 2
Issue: 6
Year: 2012




Wireless Multi-hop Network Scenario Emulation with MinGenMax Error Based on Interval Equivalent Character of Wireless Communication
Author(s): Huizhou Zhao
Volume: 2
Issue: 6
Year: 2012




Evaluation of Performance for Wireless Sensor Networks Based on Gray Theory
Author(s): JING Jun-li | YANG Jie
Volume: 2
Issue: 6
Year: 2012




TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure
Author(s): Shaneel Narayan | Paula Raymond Lutui
Volume: 2
Issue: 6
Year: 2012




Study on System Architecture Design of University Students Quality Evaluation
Author(s): He Yongqiang | Wang Jiaxin
Volume: 2
Issue: 6
Year: 2012




Software Defect Detection-oriented Static Analysis Techniques Hua ZHANG
Author(s): Hua ZHANG
Volume: 2
Issue: 6
Year: 2012




A New Solution of Multicast Packets Management for Managed Ethernet Switch
Author(s): Sheng LU
Volume: 2
Issue: 6
Year: 2012




Design and Simulation Implementation of an Improved PPM Approach
Author(s): Guo Fan | Feng Bo | Yu Min
Volume: 2
Issue: 6
Year: 2012




Feature Dimension Reduction Algorithm Based Prediction Method for Protein Quaternary Structure
Author(s): Tong Wang | Tian Xia | Xiaoxia Cao
Volume: 2
Issue: 5
Year: 2012




Empirical Network Performance Evaluation of Security Protocols on Operating Systems
Author(s): Shaneel Narayan | Michael Fitzgerald
Volume: 2
Issue: 5
Year: 2012




Luminous Intensity Control System Based on ZigBee Wireless Sensor Networks
Author(s): PEI Yan-ming | LIU Yun-hong
Volume: 2
Issue: 5
Year: 2012




Doppler Simulation and Analysis of SCME Channel Model
Author(s): Xiaoyan Huang | Xinhong Wang | Yi Zhou | Ping Wang | Fuqiang Liu
Volume: 2
Issue: 5
Year: 2012




Cross Layer Design and Performance Analysis of HARQ Schemes in Multi-Relay Networks
Author(s): Cui-Qin Dai | Li Jiang | Qian-Bin Chen | Guang-Yu Wang
Volume: 1
Issue: 5
Year: 2011




A Trust Evaluation Model for Industrial Control Ethernet Network
Author(s): ZHOU Sen-xin | HAN Jiang-hong | TANG Hao
Volume: 1
Issue: 5
Year: 2011




The Existence of Homoclinic Solutions for Second Order Hamiltonian System
Author(s): Jie Gao
Volume: 1
Issue: 5
Year: 2011




A Multicast Routing Mechanism in Mobile Ad Hoc Network Through Label Switching
Author(s): Li MengYang | Duan YunNa | Zhang ChunFei
Volume: 1
Issue: 5
Year: 2011




Power Allocation for Balancing Spectrum Efficiency and Power Consumption in Cognitive Relay Networks
Author(s): Lun Tang | Qing Li | Qian-Bin Chen
Volume: 1
Issue: 5
Year: 2011




Reduction of Feedback Based-on User Traffic Rate in OFDM Relay System
Author(s): Qian-Bin Chen | Guang-Jian Jiang | Lun Tang
Volume: 1
Issue: 5
Year: 2011




An Improved Dynamic Probabilistic Packet Marking Algorithm
Author(s): Qiao Yan | Xiaoming He | Tuwen Ning
Volume: 1
Issue: 5
Year: 2011




A Three-Party Password Authenticated Key Exchange Protocol with Key Confirmation
Author(s): Gang Yao
Volume: 1
Issue: 5
Year: 2011




Geometric Invariant Robust Image Hashing Via Zernike Moment
Author(s): Rui Sun | Xiaoxing Yan | Wenjun Zeng
Volume: 1
Issue: 5
Year: 2011




Frameproof Codes Based on The Generalized Difference Function Families
Author(s): Qingjun CAI | Yuli ZHANG
Volume: 1
Issue: 5
Year: 2011




New Downlink Scheduling Framework for Hybrid Unicast and Multicast Traffic in WiMAX Networks
Author(s): Rashid Karimi | Saleh Yousefi | Ali Azarpeyvand | Vahid.K.Alilou
Volume: 2
Issue: 5
Year: 2012




A Combining Rate Adaptation Scheme of Channel Coding and Network Coding in None-relay Downlink Wireless System
Author(s): ZiJun Shi | ZhiPing Shi | Gu Li
Volume: 2
Issue: 5
Year: 2012




An Approach to Micro-blog Sentiment Intensity Computing Based on Public Opinion Corpus
Author(s): Wu Hanxiang | Xin Mingjun | Li Weimin | Niu Zhihua
Volume: 2
Issue: 5
Year: 2012




Dynamical Frequency Assignment of WSN Based on Cloud Computing Technology
Author(s): JING Jun-li | YANG Jie
Volume: 2
Issue: 5
Year: 2012




Crash Recovery for Embedded Main Memory Database
Author(s): Yi-bing Li | Shuang Wang | Fang Ye
Volume: 2
Issue: 5
Year: 2012




Keywords Review of IT Security Literature in Recent 20 Years
Author(s): QIAN Liping | LIN Yan | WANG Lidong
Volume: 2
Issue: 5
Year: 2012




A Scheme on PN Code Tracking of DS/FH Signals for Telemetry, Tracking, and Commanding (TT&C)
Author(s): Shaohua Chen | Jiaqi Li | Ju Wang
Volume: 1
Issue: 4
Year: 2011




Study on the Distribution of Networked Devices’ Clock Skew
Author(s): Jiao Chengbo | Zheng Hui
Volume: 1
Issue: 4
Year: 2011




The Empirical Study on the Relationship between Knowledge Integration and IT Project Performance
Author(s): Ying Cui
Volume: 1
Issue: 4
Year: 2011




A New Ranging Technique for IEEE 802.16e Uplink
Author(s): Wang Shi | Wang Yingchun | Guan Jianxin
Volume: 1
Issue: 4
Year: 2011




Construction of Periodic Complementary Multiphase Sequences Based on Perfect Sequences
Author(s): Zhenyu Zhang | Fanxin Zeng | Guixin Xuan
Volume: 2
Issue: 4
Year: 2012




A modified semi-supervised color image segmentation method
Author(s): Wei Hongru | Chai Fangyong
Volume: 2
Issue: 4
Year: 2012




Products Selection Modeling of Medicine Manufacturing Industry Development in Beibuwan Economical Zone
Author(s): ZENG Jian-hong
Volume: 2
Issue: 4
Year: 2012




Data Collection Method with A Mobile Sink Node in Wireless Sensor Network
Author(s): Hu Chang Jun | Yao Shan Hua
Volume: 2
Issue: 4
Year: 2012




A Novel Method of Web Services Selection Based on Weighted Grey Relational Model in Ubiquitous Computing Environments
Author(s): Xiaocong Xiao | Yijiang Zhao | Kaiyao Fu | Xiangqun Wang
Volume: 2
Issue: 4
Year: 2012




A Robust Autofocusing Approach for Estimating Directions-ofArrival of Wideband Signals
Author(s): GONG Bing | XU Yi-tao | LI Jia | LIU Zhong-jun
Volume: 2
Issue: 4
Year: 2012




A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ
Author(s): Huiting Liu | Hua Zhang | Weilin Xu | Yigang Yang
Volume: 2
Issue: 4
Year: 2012




Adaptive HEC-VPS: The Real-time Reliable Wireless Multimedia Multicast Scheme
Author(s): Guoping Tan | Yueheng Li | Lili Zhang | Yong Lu
Volume: 2
Issue: 4
Year: 2012




Identifying Protein Structural Classes Using MVP Algorithm
Author(s): Tong Wang | Xiaoming Hu | Xiaoxia Cao
Volume: 2
Issue: 4
Year: 2012




Securing Peer-to-Peer Distributions with Trusted Platform Modules
Author(s): Hao Li | Yu Qin | Qianying Zhang | Shijun Zhao
Volume: 2
Issue: 4
Year: 2012




Relative Distance Based Routing for Delay Tolerant Mobile Sensor Network
Author(s): Jieyan Liu | Jiazhi Zeng
Volume: 1
Issue: 4
Year: 2011




A New Three-party Key Exchange Protocol Based on Diffie-Hellman
Author(s): Chunling Liu | Yufeng Wang | Qinxi Bai
Volume: 1
Issue: 4
Year: 2011




A New Joint Antenna Selection Algorithm Based on Capacity
Author(s): Li Yuan | Liu Ping | Li Jianlan
Volume: 1
Issue: 4
Year: 2011




Next Generation Campus Network Deployment Project Based on Softswitch
Author(s): HU Feng | LIU Ziyan
Volume: 1
Issue: 4
Year: 2011




A New R*Q-tree Spatial Index based on the Delaying Selection and Clustering Splitting
Author(s): Quanyou Song | Wan-gao Li
Volume: 1
Issue: 4
Year: 2011




The Study on Formal Verification of OS Kernel
Author(s): Zhang Yu | Dong Yunwei | Zhang Zhongqiu | Huo Hong | Zhang Fan
Volume: 1
Issue: 3
Year: 2011




Format-Compliant Encryption of JPEG2000 Codestreams
Author(s): Zhiguo Chang | Jian Xu
Volume: 1
Issue: 3
Year: 2011




The Study of Access Control for Service-Oriented Computing in Internet of Things
Author(s): Guoping Zhang | Jing Liu
Volume: 2
Issue: 3
Year: 2012




A QoS Multicast Routing in TDMA-Based MANET Using Directional Antennas
Author(s): Yuan Li | Xing Luo
Volume: 1
Issue: 3
Year: 2011




Compose Real-world Service With Context
Author(s): Guoping Zhang | Jiazheng Tian
Volume: 1
Issue: 3
Year: 2011




The Channels and Demands Analysis for Chinese Farmers’ Agricultural Information Acquisition
Author(s): Tingting Zhang | Zhensheng Tao
Volume: 2
Issue: 3
Year: 2012




A Simple Algorithm to Strengthen the Brightness of Color Images
Author(s): Hua ZHANG
Volume: 1
Issue: 3
Year: 2011




Design and Implementation of Management Information System of Field and Track Training
Author(s): Feng Bing
Volume: 2
Issue: 3
Year: 2012




Study on Quality Evaluation System for University Students
Author(s): He Yongqiang | Yang Mingming
Volume: 1
Issue: 3
Year: 2011




Research on Trustworthy Distributed System
Author(s): LUO Chen | HE Ming | LIU Xiao-Ming | LI Yuan
Volume: 2
Issue: 3
Year: 2012




A Scalable Simulation Method for Network Attack
Author(s): Jinsong Wang | Wenchao Dou | Kai Shi
Volume: 1
Issue: 3
Year: 2011




A Data Flow Behavior Constraints Model for Branch Decisionmaking Variables
Author(s): Lu Yan | Wang Dan | Zhao Wen Bing
Volume: 2
Issue: 3
Year: 2012




Enlightenment on Computer Network Reliability From Transportation Network Reliability
Author(s): Hu Wenjun | Zhou Xizhao
Volume: 1
Issue: 3
Year: 2011




Two Noise Addition Methods For Privacy-Preserving Data Mining
Author(s): Likun Liu | liang Hu | Di Wang | Yanmei Huo | Lei Yang | Kexin Yang
Volume: 2
Issue: 3
Year: 2012




Polynomial Algorithm for Node Deployment in Hybrid Wireless Sensor Networks
Author(s): Lili Zhang | Jing Yuan | Yingchi Mao | Xiwei Zhang | Guihai Chen
Volume: 1
Issue: 3
Year: 2011




The Economic Evaluation of Lighting Energy-saving Modification Program
Author(s): YANG Yuan | LI Wei-hua | ZHANG Xing-zheng | YANG Chu-qi
Volume: 2
Issue: 3
Year: 2012




A Comprhensive CBVR System Based on Spatiotemporal Features Such as Motion,Quantized Color and Edge Density Features
Author(s): Kalpana S.Thakre | Archana M.Rajurkar
Volume: 1
Issue: 3
Year: 2011




The Research and Application of Webpage Temper-proofing System
Author(s): Wu Beihua | Wang Yongquan
Volume: 2
Issue: 3
Year: 2012




The Research of On-line Monitoring System of Power Cable Joint Temperature
Author(s): Jianwen Wang | Zhengfeng Wang | Peng Li
Volume: 2
Issue: 3
Year: 2012




Matlab Simulink of COST231-WI Model
Author(s): Yihuai Yang | Dongya Shen | Yonggang Xie c | Xiangde Li
Volume: 2
Issue: 3
Year: 2012




A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks
Author(s): Hu HongNing | Liu Zhong | Li Lu
Volume: 2
Issue: 2
Year: 2012




Research of Virtual Channels Scheduling Algorithm Based on Priority in Packet Telemetry System
Author(s): TIAN Ye | ZHANG Zi-jing | ZHANG Yan-qin | XIAO Guang-yuan
Volume: 2
Issue: 2
Year: 2012




Estimate BER Distributions of Turbo Codes
Author(s): Shao Xia | Zhang Weidang
Volume: 2
Issue: 2
Year: 2012




Research on Excessive Road Fuel Problem Based on Extension Strategy Generating Method
Author(s): Li Shu fei | Ye Guang zai
Volume: 2
Issue: 2
Year: 2012




The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures
Author(s): Wazir Zada Khan | Yang Xiang | Mohammed Y Aalsalem | Quratulain Arshad
Volume: 2
Issue: 2
Year: 2012




An Approach Towards Dynamic Opportunistic Routing in Wireless Mesh Networks
Author(s): Sudhanshu Kulshrestha | Aditya Trivedi
Volume: 2
Issue: 2
Year: 2012




A Multi-step Attack Recognition and Prediction Method Via Mining Attacks Conversion Frequencies
Author(s): MAN Da-peng | LI Xue-zhen | YANG Wu | WANG Wei | XUAN Shi-chang
Volume: 2
Issue: 2
Year: 2012




The Application of Federated Kalman Filtering in SINS/GPS/CNS Intergrated Navigation System
Author(s): DENG Hong | LIU Guang-bin | CHEN Hao-ming | DENG Chun-lin
Volume: 2
Issue: 2
Year: 2012




The Comparison of Machine Learning Algorithms on Online Classification of Network Flows
Author(s): Keji Wei | Shaolong Cao | Jian Yu
Volume: 2
Issue: 2
Year: 2012




Research on Diffusion Strategy About Resource Index of MP2P
Author(s): Fangfang Guo | Jing Xu
Volume: 2
Issue: 2
Year: 2012




A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack
Author(s): Wenbing Wang | Zhifeng Zhang
Volume: 1
Issue: 2
Year: 2011




An Incentive Compatible Reputation Model for P2P Networks
Author(s): Jianli Hu | Bin Zhou
Volume: 1
Issue: 2
Year: 2011




A Speech Enhancement Method Based on Kalman Filtering
Author(s): Chaogang Wu | Bo Li | Jin Zheng
Volume: 1
Issue: 2
Year: 2011




Discussion on IGMP Snooping and Its Sequence in Industrial Applicaiton
Author(s): Sheng LU | Chuan WEN
Volume: 1
Issue: 2
Year: 2011




Fast Matching Algorithm Based on Fingerprint Classification Information
Author(s): Na Li | Wenbi Rao | Tiecheng Xu
Volume: 1
Issue: 2
Year: 2011




A Novel Approach to Simulate DDoS Attack
Author(s): Qing LI | LeJun CHI | ZhaoXin ZHANG
Volume: 1
Issue: 2
Year: 2011




Research of NCS Real-time Performance with Judging Priority Based on Generalized Stability
Author(s): Hengrong LU
Volume: 1
Issue: 2
Year: 2011




A Weighed Least Square TDOA Location Algorithm for TDMA Multi-target
Author(s): WANG XU | HE ZI-SHU
Volume: 1
Issue: 2
Year: 2011




Demand-Driven Dynamic Spectrum Allocation in Heterogeneous Cellular Networks
Author(s): Li Wang | Huiyue Yi | Honglin Hu | Jianan Liu | Bin Chen
Volume: 1
Issue: 2
Year: 2011




Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems
Author(s): GAO Shou-ping | WANG Lu-da
Volume: 1
Issue: 2
Year: 2011




ACO Algorithm Applied to Multi-Objectives Optimization of Capacity Expansion in Next Generation Wireless Network
Author(s): Dac-Nhuong Le | Son HongNgo | Vinh Trong Le
Volume: 3
Issue: 1
Year: 2013




Channel Capacity and BER Performance Analysis of MIMO System with Linear Receiver in Nakagami Channel
Author(s): Samarendra Nath Sur | Debjyoti Ghosh
Volume: 3
Issue: 1
Year: 2013




Optimal Spectrum Access for Users in Multi-Channel Cognitive Radio Networks
Author(s): Vivek Agrawal | Utkarsh Tiwari | Vishal Agarwal | Palaniandavar Venkateswaran
Volume: 3
Issue: 1
Year: 2013




Novel Hybrid Spectrum Handoff for Cognitive Radio Networks
Author(s): Nisar A. Lala | Moin Uddin | N A Sheikh
Volume: 3
Issue: 1
Year: 2013




Adaptive Cross-layer Resource Allocation by HNN in OFDM-MISO System
Author(s): Mingyan Jiang | Yulong Liu
Volume: 2
Issue: 1
Year: 2012




A double auction scheme based on secret sharing and safe comparing protocol
Author(s): Bin Zhang | Qiuliang Xu | Han Jiang
Volume: 2
Issue: 1
Year: 2012




Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud
Author(s): Xi Chen | Yong Li
Volume: 2
Issue: 1
Year: 2012




An Unconditionally Secure Authentication Code For Multi-Source Network Coding
Author(s): Hong Yang | Mingxi Yang
Volume: 2
Issue: 1
Year: 2012




Defense on Split-Network Attack in Wireless Sensor Network
Author(s): Du Chunlai | hang Jianshun | Ma Li
Volume: 2
Issue: 1
Year: 2012




Research on Audience Rating Statistics of Two-way Digital TV Based on OpenSSL
Author(s): Chen Junhua | Yang Fan
Volume: 2
Issue: 1
Year: 2012




A Method of Target Detection in Remote Sensing Image Captured based for Sensor Network
Author(s): Yingchun Shen | Hai Jin
Volume: 2
Issue: 1
Year: 2012




HACCP and the Risk Assessment of Cold-chain
Author(s): Zhang QingYing | Chen Zhimin
Volume: 1
Issue: 1
Year: 2011




Study on Thickness Calculation Method for Undigraph
Author(s): Yan Cui | Chao-Dong Cui
Volume: 1
Issue: 1
Year: 2011




A Design of Trust Degree Transfer Algorithm for P2P Network
Author(s): Wang Hao-yu | Ge Tong-min | Ji Xiao-juan | Hu Bao-an
Volume: 2
Issue: 1
Year: 2012




Design of NAND FLASH File System Based on Loss of Balance Algorithm
Author(s): Jinwu Ju | Lecai Cai
Volume: 1
Issue: 1
Year: 2011




Study on Replica Strategy in the Grid Environment
Author(s): Rui-qiong Zhong | Yun-jia Xi | De-zhi Han
Volume: 1
Issue: 1
Year: 2011




Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks
Author(s): Yu Zhang | Xing She Zhou | Yee Wei Law | Marimuthu Palaniswami
Volume: 2
Issue: 1
Year: 2012




Structure and Control of Flywheel Energy Converter
Author(s): Yiming He | Xianyi Qian
Volume: 1
Issue: 1
Year: 2011




A Group-oriented Access Control Scheme for P2P Networks
Author(s): Wang Xiaoming | Cheng Fan
Volume: 1
Issue: 1
Year: 2011




Power Factor Analysis of the Linear Motor in Mines
Author(s): Xianyi Qian
Volume: 1
Issue: 1
Year: 2011




Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach
Author(s): Guo Fan | Lu JiaXing | Yu Min
Volume: 1
Issue: 1
Year: 2011




Application of PKI in Encrypting Communications and Verifying Identities of Users in the Internet Banking
Author(s): Xingyu Gong | Shangfu Gong
Volume: 1
Issue: 1
Year: 2011



