Login / Signup
WCNIS
2010
2010
2010
Keyphrases
Publications
2010
Jianxin Fu
,
Lianfen Huang
,
Yan Yao
Application of BP neural network in wireless network security evaluation.
WCNIS
(2010)
Chungang Yang
,
Jiandong Li
Dynamic resource management mechanism design for heterogeneous networks under IEEE1900.4 framework: A network utility maximization perspective.
WCNIS
(2010)
Runping Yuan
,
Taiyi Zhang
,
Jianxiong Huang
,
Jing Zhang
,
Zhenjie Feng
Performance analysis of opportunistic cooperative communication over Nakagami-m fading channels.
WCNIS
(2010)
Wenjing Yang
,
Xinyu Yang
,
Guozheng Liu
,
Wei Yu
An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs.
WCNIS
(2010)
Zhenyi Luo
,
Jiying Zhao
Wideband audio over narrowband based on digital watermarking.
WCNIS
(2010)
Bin Chen
,
Peng Cai
,
Yong Zhang
,
Jian Huang
,
Yun-Song Wu
,
Jun Tang
Research on autocorrelation of chaotic sequence by phase space method.
WCNIS
(2010)
Chien-Ting Liu
,
Te-Chih Wang
,
Ray-I Chang
,
Chia-Hui Wang
Cross-layer handoff via predictive multiple pre-registrations for QoS of mobile multimedia applications.
WCNIS
(2010)
Christopher Kunz
,
Jan Wiebelitz
,
Matthew Smith
An attack-resilient Grid auditing infrastructure.
WCNIS
(2010)
Zhang Yi
,
Yao Fu-qiang
Optimal noncoherent frequency detection of differential frequency hopping signal.
WCNIS
(2010)
Nedal Ababneh
Evaluation of On/Off scheduling protocols for ad hoc and sensor networks.
WCNIS
(2010)
Chunlong Fan
,
Zhouhua Yu
,
Lei Xu
Objective evaluation of Spider Detection Techniques.
WCNIS
(2010)
Miao Yu
,
Shiju Li
,
Jianzhong Chen
Convergence characteristics analysis on blind separation of DS-CDMA signals with ICA method.
WCNIS
(2010)
Cheng Zhou
,
Ruimin Hu
,
Heng Wang
A higher-order prediction method of spatial cues based on Bayesian Gradient model.
WCNIS
(2010)
Wei Xue
,
Wei-qun Ma
,
Bing-cai Chen
Research on a realization method of the optimized efficient spectrum signals using Legendre series.
WCNIS
(2010)
Die Hu
,
Xiaolin Zhou
A new pilot design method for OFDM systems with virtual subcarriers.
WCNIS
(2010)
Chunhui Piao
,
Zhenjiang Fan
,
Chunyan Yang
,
Xufang Han
Research on RFID security protocol based on grouped tags and re-encryption scheme.
WCNIS
(2010)
Xiao-Yu Wan
,
Zhang Li
,
Zi-fu Fan
A SIP DoS flooding attack defense mechanism based on priority class queue.
WCNIS
(2010)
Zhihui Shu
,
Wen Chen
Optimal power allocation in cognitive relay networks under different power constraints.
WCNIS
(2010)
Binggang Xiao
,
Xiumin Wang
,
Jixiang Zhao
A band notched ultra-wideband antenna using complementary split ring resonator.
WCNIS
(2010)
George Mathew
,
Xiaojiang Du
Securing multi-tiered web applications.
WCNIS
(2010)
Zhen Chen
,
Fachao Deng
,
An'an Luo
,
Xin Jiang
,
Guo-Dong Li
,
Run-hua Zhang
,
Chuang Lin
Application level network access control system based on TNC architecture for enterprise network.
WCNIS
(2010)
Yusong Du
,
Dingyi Pei
Count of annihilators of Boolean functions with given algebraic immunity.
WCNIS
(2010)
Xiang Zhang
,
Wenbo Wang
,
Shuping Chen
,
Chunyi Wang
Multi-cell channel estimation and multi-cell joint detection in TD-SCDMA system.
WCNIS
(2010)
Gyözö Gódor
,
Norbert Giczi
,
Sándor Imre
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations.
WCNIS
(2010)
Ruzhi Xu
,
Liwu Deng
,
Jian Guo
A learning-based anomaly detection model of SQL attacks.
WCNIS
(2010)
Zhen-Guo Yang
,
Liusheng Huang
,
Mingjun Xiao
,
Wang Liu
Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint.
WCNIS
(2010)
Xiaonian Tang
,
Guijun Nian
,
Quan Wen
,
Jianchun Wang
,
Xiaoyan Tang
Robust watermarking in multiwavelet domain based on average subimage of low frequency.
WCNIS
(2010)
Ling-ling Wang
Multi-party concurrent signatures based on short ring signatures.
WCNIS
(2010)
Kiwoon Sung
,
Suman Srinivasan
,
Henning Schulzrinne
BBS-ONE: Bulletin board and forum system for mobile opportunistic networks.
WCNIS
(2010)
Changlong Chen
,
Min Song
,
George Hsieh
Intrusion detection of sinkhole attacks in large-scale wireless sensor networks.
WCNIS
(2010)
Nedal Ababneh
,
Houda Labiod
A performance analysis of VANETs routing protocols using different mobility models.
WCNIS
(2010)
Yi Tang
,
Yuanyuan Wu
,
Quan Zhou
AASC: Anonymizing network addresses based on subnet clustering.
WCNIS
(2010)
Yuan Wang
,
Duncan S. Wong
,
Liusheng Huang
One-pass key establishment for anonymous wireless roaming.
WCNIS
(2010)
Wenbai Chen
,
Xiaopin Zhang
,
Wei Li
An scheme improved on iterative detection algorithm for V-BLAST.
WCNIS
(2010)
Rentao Zhao
,
Zhifang Zhang
,
Jun Tie
,
Jun Li
Design and implementation of mesh-based current distribution on-line monitoring system in aluminum reduction cells.
WCNIS
(2010)
Lei Zhang
,
Weibing Xu
,
Haibo Wang
The upper bounds of punctured ring convolutional coded continuous phase modulation.
WCNIS
(2010)
Mahdi Kashiha
,
Mehrdad Ardebilipour
,
Ehsan Soleimani-Nasab
An adaptive method for multi-user MIMO power controlled systems.
WCNIS
(2010)
Deepak Subramanian
,
Ha-Thanh Le
,
Peter Kok Keong Loh
,
Annamalai Benjamin Premkumar
An empirical vulnerability remediation model.
WCNIS
(2010)
Alex K. Ohoussou
,
Hai Jin
,
Deqing Zou
,
Feng Zhao
,
Guofu Xiang
,
Ge Cheng
Autonomous agent based intrusion detection in virtual computing environment.
WCNIS
(2010)
Caihua Yin
,
Yu Zheng
,
Dawei Ma
,
Gang Yu
,
Jian Wang
Detection of the CDMA-based transform domain communication system.
WCNIS
(2010)
Hui-bin Wang
A new model of formal design system of security authentication protocol.
WCNIS
(2010)
Hossein Khaleghi Bizaki
Channel imperfection effects on THP performance in a slowly time varying MIMO channels.
WCNIS
(2010)
Shengjian Chen
,
Lei Xu
A boundary-scan test bus controller design for mixed-signal test.
WCNIS
(2010)
Mohamed Hamdi
,
Noureddine Boudriga
Content-based network filtering of encrypted image data.
WCNIS
(2010)
Yue Yao
,
Yong Fan
,
Haiyan Luo
A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks.
WCNIS
(2010)
Xiaopeng Huang
Capacity criterion-based power loading for underwater acoustic OFDM system with limited feedback.
WCNIS
(2010)
Xue Yuan
Biometric verification using hand vein-patterns.
WCNIS
(2010)
Jiayan Zhang
,
Ma Jing
,
Shaochuan Wu
Robust transmission of progressive images in the deep space communication.
WCNIS
(2010)
Nikolaos Bogonikolos
,
Georgios Mantas
,
Giorgos Kostopoulos
ARATOS: An intelligent machine-to-machine framework for services based on satellite Earth Observation data.
WCNIS
(2010)
Soumaya Zirari
,
Philippe Canalda
,
François Spies
WiFi GPS based combined positioning algorithm.
WCNIS
(2010)