Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Xiaopeng Huang |
Capacity criterion-based power loading for underwater acoustic OFDM system with limited feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 54-58, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Khaleghi Bizaki |
Channel imperfection effects on THP performance in a slowly time varying MIMO channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 212-216, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xue Yuan |
Biometric verification using hand vein-patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 677-681, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wenbai Chen, Xiaopin Zhang, Wei Li |
An scheme improved on iterative detection algorithm for V-BLAST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 151-154, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Binggang Xiao, Xiumin Wang, Jixiang Zhao |
A band notched ultra-wideband antenna using complementary split ring resonator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 110-112, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Zhang, Wenbo Wang 0007, Shuping Chen, Chunyi Wang |
Multi-cell channel estimation and multi-cell joint detection in TD-SCDMA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 130-134, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jiayan Zhang, Ma Jing, Shaochuan Wu |
Robust transmission of progressive images in the deep space communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 4-8, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Changlong Chen, Min Song 0002, George Hsieh |
Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 711-716, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Die Hu, Xiaolin Zhou |
A new pilot design method for OFDM systems with virtual subcarriers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 73-77, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Subramanian, Ha-Thanh Le, Peter Kok Keong Loh, Annamalai Benjamin Premkumar |
An empirical vulnerability remediation model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 376-380, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Kunz, Jan Wiebelitz, Matthew Smith 0001 |
An attack-resilient Grid auditing infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 635-639, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yue Yao, Yong Fan, Haiyan Luo |
A distributed relay node placement strategy based on balanced network lifetime for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 306-310, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nedal Ababneh |
Evaluation of On/Off scheduling protocols for ad hoc and sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 419-423, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ruzhi Xu, Liwu Deng, Jian Guo |
A learning-based anomaly detection model of SQL attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 639-642, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nikolaos Bogonikolos, Georgios Mantas, Giorgos Kostopoulos |
ARATOS: An intelligent machine-to-machine framework for services based on satellite Earth Observation data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 338-342, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ling-ling Wang |
Multi-party concurrent signatures based on short ring signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 515-517, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cheng Zhou, Ruimin Hu, Heng Wang |
A higher-order prediction method of spatial cues based on Bayesian Gradient model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 85-89, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Tang 0001, Yuanyuan Wu, Quan Zhou |
AASC: Anonymizing network addresses based on subnet clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 672-676, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bin Chen, Peng Cai, Yong Zhang, Jian Huang, Yun-Song Wu, Jun Tang |
Research on autocorrelation of chaotic sequence by phase space method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 6-12, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang, Weibing Xu, Haibo Wang |
The upper bounds of punctured ring convolutional coded continuous phase modulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 154-157, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Wan, Zhang Li, Zi-fu Fan 0001 |
A SIP DoS flooding attack defense mechanism based on priority class queue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 428-431, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Caihua Yin, Yu Zheng, Dawei Ma, Gang Yu, Jian Wang |
Detection of the CDMA-based transform domain communication system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 193-197, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Runping Yuan, Taiyi Zhang, Jianxiong Huang, Jing Zhang, Zhenjie Feng |
Performance analysis of opportunistic cooperative communication over Nakagami-m fading channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 49-53, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Hamdi, Noureddine Boudriga |
Content-based network filtering of encrypted image data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 343-348, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Chen, Fachao Deng, An'an Luo, Xin Jiang, Guo-Dong Li, Run-hua Zhang, Chuang Lin 0002 |
Application level network access control system based on TNC architecture for enterprise network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 667-671, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yusong Du, Dingyi Pei |
Count of annihilators of Boolean functions with given algebraic immunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 640-643, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhenyi Luo, Jiying Zhao |
Wideband audio over narrowband based on digital watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 697-701, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gyözö Gódor, Norbert Giczi, Sándor Imre |
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 650-657, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Miao Yu, Shiju Li, Jianzhong Chen |
Convergence characteristics analysis on blind separation of DS-CDMA signals with ICA method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 238-242, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaonian Tang, Guijun Nian, Quan Wen, Jianchun Wang, Xiaoyan Tang |
Robust watermarking in multiwavelet domain based on average subimage of low frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 460-464, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Soumaya Zirari, Philippe Canalda, François Spies |
WiFi GPS based combined positioning algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 684-688, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhen-Guo Yang, Liusheng Huang, Mingjun Xiao, Wang Liu |
Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 451-455, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chunlong Fan, Zhouhua Yu, Lei Xu |
Objective evaluation of Spider Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 544-548, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kiwoon Sung, Suman Srinivasan, Henning Schulzrinne |
BBS-ONE: Bulletin board and forum system for mobile opportunistic networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 371-376, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wenjing Yang, Xinyu Yang, Guozheng Liu, Wei Yu 0002 |
An Interference Avoidance Multipath Routing protocol based on greedy forwarding in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 483-487, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nedal Ababneh, Houda Labiod |
A performance analysis of VANETs routing protocols using different mobility models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 498-502, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Xue, Wei-qun Ma, Bing-cai Chen |
Research on a realization method of the optimized efficient spectrum signals using Legendre series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 155-159, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Wang, Duncan S. Wong, Liusheng Huang |
One-pass key establishment for anonymous wireless roaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 533-537, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jianxin Fu, Lianfen Huang, Yan Yao |
Application of BP neural network in wireless network security evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 592-596, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rentao Zhao, Zhifang Zhang, Jun Tie, Jun Li |
Design and implementation of mesh-based current distribution on-line monitoring system in aluminum reduction cells. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 143-146, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chunhui Piao, Zhenjiang Fan, Chunyan Yang, Xufang Han |
Research on RFID security protocol based on grouped tags and re-encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 568-572, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi Kashiha, Mehrdad Ardebilipour, Ehsan Soleimani-Nasab |
An adaptive method for multi-user MIMO power controlled systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 68-72, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chien-Ting Liu, Te-Chih Wang, Ray-I Chang, Chia-Hui Wang |
Cross-layer handoff via predictive multiple pre-registrations for QoS of mobile multimedia applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 608-612, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alex K. Ohoussou, Hai Jin 0001, Deqing Zou, Feng Zhao 0003, Guofu Xiang, Ge Cheng |
Autonomous agent based intrusion detection in virtual computing environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 682-686, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhihui Shu, Wen Chen 0001 |
Optimal power allocation in cognitive relay networks under different power constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 647-652, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hui-bin Wang |
A new model of formal design system of security authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 549-552, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chungang Yang, Jiandong Li 0001 |
Dynamic resource management mechanism design for heterogeneous networks under IEEE1900.4 framework: A network utility maximization perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 333-337, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shengjian Chen, Lei Xu |
A boundary-scan test bus controller design for mixed-signal test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 22-25, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | George Mathew, Xiaojiang Du |
Securing multi-tiered web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 505-509, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhang Yi, Yao Fu-qiang |
Optimal noncoherent frequency detection of differential frequency hopping signal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 146-149, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhongxun Wang, Xingcheng Wang, Xinqiao Yu, Dong Guo |
A BP decoding algorithm based on nodes residual for LDPC codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 124-127, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaojun Tong, Zhangquan Zhao, Huimin Shuai, Zhu Wang 0008 |
The research of worm distributed detection technology based on network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 416-420, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Schridde, Tim Dörnemann, Ernst Juhnke, Bernd Freisleben, Matthew Smith 0001 |
An identity-based security infrastructure for Cloud environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 644-649, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fan Yang, Zhen-kai Wang, Jianya Chen, Yunjie Liu 0001 |
VLB-VNE: A regionalized Valiant Load-balancing algorithm in virtual network mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 432-436, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Franco Tommasi, Simone Molendini, Elena Scialpi, Catiuscia Melle |
CHARMS: Cooperative hybrid architecture for relaying multicast satellite streams to sites without a satellite receiver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 269-276, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wenhui Lu, Zheying Zhang, Jyrki Nummenmaa |
A generic data model with a decomposition operation for DRM interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 630-634, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yejun Liu, Qingyang Song, Lei Guo 0005, Xingwei Wang 0001 |
A novel QoS-oriented packet scheduling algorithm for mixed services in the downlink of OFMDA system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 397-402, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Adrian-Valentin Nedelcu, Doru Talaba, Vlad Cristian Stoianovici, Mihai Machedon-Pisu, Iuliu Székely |
Conceptual integration of wireless sensor networks with 3D virtual environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 446-450, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hua Jiang, Xianru Du, Yongxing Jia, Weizhi Wang |
An identity-based security mechanism for P2P VoIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 481-485, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Guoan Zhao, Liming Fang 0001, Jiandong Wang, Chunpeng Ge, Yongjun Ren |
Improved unidirectional chosen-ciphertext secure proxy re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 476-480, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ling Chen, Bing Wu, Zhiwei Hu, Jiahong Liang |
Characterizing protocol interaction using metamodeling methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 441-445, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liquan Zhao, Yanfei Jia |
Interharmonic estimation based on complex valued independent component analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 248-251, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tinghai Yue |
A construction of binary vector-output plateaued functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 401-405, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chunlei Wang, Yan Wen, Yiqi Dai |
A software vulnerability analysis environment based on virtualization technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 620-624, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jingbo Yuan, Shunli Ding, Dan Zhang |
An energy-balancing routing protocol based on AODV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 588-592, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lan Ma, Hanming Yan, Zonghui Jin |
The secure approach of accessing to the kernel database in state key information system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 167-172, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhitao Guan, Jietao He, Kehe Wu, Shuai Yuan |
Research on a Behavior-based active controllable defense model and its application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 687-691, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hongying Tang, Wen Chen 0001 |
Diversity-multiplexing tradeoff analysis for wireless multicast systems with Amplify-and-Forward scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 295-300, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lizhong Song |
Simulation and analysis of a spherical conformal Archimedean spiral antenna. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 173-177, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lai Xin, Zhu Yi, Zhai Hualei, Li Jun |
Research on position algorithm based on similarity for wireless Ad Hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 223-227, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanxia Liang, Jiawei Yang, Ye Li |
A Multimode Multi-Band Excitation with Linear Prediction vocoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 256-259, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sondes Larafa, Maryline Laurent |
Authentication protocol runtime evaluation in distributed AAA framework for Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 277-281, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Qiao Luo, Jing Chen, Chonghui Huang, Guirong Chen |
Study of MANET routing evaluation model based on Best-First. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 329-332, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Li Yang 0007, Martin Tomlinson, Marcel Ambroze |
Decoding low-density parity-check codes with error-floor free over the AWGN channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 192-196, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Youwei Sun, Rong Chen, Guangning Xu |
The constitution of the transmission network for the next generation cable digital TV signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 229-233, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jun-Zhao Sun, Jiehan Zhou |
Querying sensor networks with extended SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 634-638, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hongying Zhao, Ling Wang |
E-commerce website credible model based on fuzzy grey method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 643-646, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shuying Zhang, Shufen Liu, Yue Gao, Jianmei Ge, Limin Wang |
A credible network intrusion detection system based on grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 528-532, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ying Li, Lu-Sheng Chen |
Multi-conditional e-Cash with transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 381-385, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liqin Tian, Chuang Lin 0002 |
Computation and analysis of node intending trust in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 496-499, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | H. M. Savitha, Muralidhar Kulkarni |
Performance comparison of hard and soft-decision turbo coded OFDM systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 551-555, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jing Hu 0002, Lianfeng Shen, Yang Yang, Ruichao Lv |
Design and implementation of wireless sensor and actor network for precision agriculture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 571-575, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhen-Wu Wang |
A generic access control model based on ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 335-339, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shunfu Jin, Wuyi Yue |
Performance evaluation of self-similar traffic in multimedia wireless communication networks with power saving class type III in IEEE 802.16e. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 436-440, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xun Wang 0007, Qing-Feng Chen, Bailin Yang |
Simulation of adaptive FEC mechanism for streaming 3D models over wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 519-524, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Abdul Quadeer |
Enhanced equalization in OFDM systems using cyclic prefix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 40-44, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jingdong Sun, Yibin Zhang |
Railway passenger dynamic E-business based on Web services and RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 577-581, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lili Li, Xiangzhong Fang |
Adaptive detection for spread spectrum audio watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 58-62, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Ta Lee, Frank Yeong-Sung Lin |
Boundary monitoring algorithms for wireless sensor networks of grouping capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 461-467, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Necmi Taspinar, Muhammet Nuri Seyman |
Back propagation neural network approach for channel estimation in OFDM system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 265-268, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhuo Wang, Lizhi Wang, Yong Yang |
Remove multifrequency mixture noise in processing of Wireless Communication wave/radar reflect signal by method of ICA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 50-53, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Caihua Yin, Dawei Ma, Yu Zheng, Gang Yu, Jian Wang |
Channel estimation and symbol demodulation of the transform domain communication system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 233-236, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Ding, Yubin Xu |
A novel spatial Dynamic Spectrum Allocation in the urban heterogeneous scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 387-391, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fawwaz J. Jibrael, Wafaa S. Mummo, Mahmoud T. Yaseen |
Multiband cross fractal dipole antenna for UHF and SHF applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 219-223, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ning An, Bingbing Li, Min Huang 0003 |
Research on modulation classification using empirical mode decomposition method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 211-214, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wanlu Sun, Wei Yang, Lihua Li 0001 |
A simple channel estimation method in MIMO-OFDM systems with virtual subcarriers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 35-39, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nejla Essaddi, Mohamed Hamdi, Noureddine Boudriga |
A new tracking-aware gossiping scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 349-354, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Binggang Xiao, Xiumin Wang, Jixiang Zhao |
Ultra-wideband antenna with frequency notch characteristic using a complementary split ring resonator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 113-115, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zujue Chen, Jie Cao, Shaoqing Liu |
A fast motion estimation optimization for H.264/AVC encoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 116-119, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sunghyuck Hong, Sunho Lim |
Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 692-696, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|