default search action
Communications and Network, Volume 2
Volume 2, Number 1, February 2010
- Chunjie Chen, Chao Jin, Demin Li, Jiacun Wang, Jianan Fang:
Using the Power Control and Cooperative Communication for Energy Saving in Mobile Ad Hoc Networks. 1-10 - Jin Young Choi:
A Comparison Study of Input ESD Protection Schemes Utilizing NMOS, Thyristor, and Diode Devices. 11-25 - Lorenzo Iorio:
On Possible A-Priori "Imprinting" of General Relativity Itself on the Performed Lense-Thirring Tests with LAGEOS Satellites. 26-30 - Tadeusz Wibig:
Neural Network Performance for Complex Minimization Problem. 31-37 - Zhijin Zhao, Zhen Peng, Zhidong Zhao, Shilian Zheng:
Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint. 38-43 - Xiaolu Li, Yuesong Jiang, Lijun Xu:
A Historical Narrative of Study of Fiber Grating Solitons. 44-49 - Chunhe Song, Hai Zhao, Wei Jing, Dan Liu:
ADPF Algorithm for Target Tracking in WSN. 50-53 - Hari Om, Tapas K. Sarkar:
Designing Intrusion Detection System for Web Documents Using Neural Network. 54-61 - R. P. Martínez-y-Romero, H. N. Núnez-Yépez, A. L. Salas-Brito:
On Solvable Potentials, Supersymmetry, and the One-Dimensional Hydrogen Atom. 62-64 - Tomasz Dlugosz, Hubert Trzaska:
How to Measure in the Near Field and in the Far Field. 65-68 - Munir B. Sayyad, Abhik Chatterjee, Sanjay L. Nalbalwar:
Proposed Model for SIP Security Enhancement. 69-72 - Meeru Chaudhri, A. Vohra, S. K. Chakarvarti:
A Model for Cu-Se Resonant Tunneling Diodes Fabricated by Negative Template Assisted Electrodeposition Technique. 73-78 - Satish Chand:
Live Video Services Using Fast Broadcasting Scheme. 79-85
Volume 2, Number 2, May 2010
- Hao Niu, Taiyi Zhang, Li Sun:
Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks. 87-92 - Mingxiang Guan, Fang Yuan, Xueyuan Wan, Weizhi Zhong:
Method of Carrier Acquisition and Track for HAPS. 93-96 - Hamid-Reza Bahrami, Tho Le-Ngoc:
Maximum Ratio Combining Precoding for Multi-Antenna Relay Systems. 97-103 - Zheng Teng, Ki-Il Kim:
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks. 104-112 - Peter Vorobiyenko, Kirill Dmitry Guliaiev, Dmitry Anatoly Zaitsev, Tatiana R. Shmeleva:
PBB Efficiency Evaluation via Colored Petri Net Models. 113-124 - Alain Bertrand Bomgni, Jean Frédéric Myoupo:
An Energy-Efficient Clique-Based Geocast Algorithm for Dense Sensor Networks. 125-133 - Sanjay P. Ahuja, Nicole Collier:
An Assessment of WiMax Security. 134-137 - Iqbal Husain, Rumana G. Mattoo:
Multiobjective Duality in Variational Problems with Higher Order Derivatives. 138-144
Volume 2, Number 3, August 2010
- Sheng Chen, Lie-Liang Yang:
Downlink MBER Transmit Beamforming Design Based on Uplink MBER Receive Beamforming for TDD-SDMA Induced MIMO Systems. 145-151 - Stephen Hurley, Leigh Hodge:
Compromise in CDMA Network Planning. 152-161 - Amandeep Singh Sappal, Manjeet Singh Patterh, Sanjay Sharma:
A Novel Black Box Based Behavioral Model of Power Amplifier for WCDMA Applications. 162-165 - Fabio Garzia, Roberto Cusani:
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution. 166-182 - Sanjay Ahuja, Pavan Potti:
An Introduction to RFID Technology. 183-186 - Ying Zheng:
A Security Transfer Model Based on Active Defense Strategy. 187-192 - Fabio Garzia, Cristina Perna, Roberto Cusani:
Optimization of UMTS Network Planning Using Genetic Algorithms. 193-199 - Sanjay Ahuja, Je-Loon Yang:
Performance Evaluation of Java Web Services: A Developer's Perspective. 200-206
Volume 2, Number 4, November 2010
- David Bermingham, Zhen Liu, Xiaojun Wang:
SimNP: A Flexible Platform for the Simulation of Network Processing Systems. 207-215 - Ilya M. Averin, Victor T. Ermolayev, Alexander G. Flaksman:
Locating Mobile Users Using Base Stations of Cellular Networks. 216-220 - My Abdelkader Youssefi, Jamal El Abbadi:
Optimal Spacing Design for Pilots in OFDM Systems over Multipath Fading Channels. 221-229 - Jing Feng, Ruoshan Kong, Yulin Wang:
A Novel Digital Rights Management Scheme in P2P Networks. 230-234 - Fabio Garzia, Roberto Cusani:
All-Optical Cryptographic Device for Secure Communication. 235-245 - Sunday E. Iwasokun, Michael O. Kolawole:
USING Hybrid Adaptive Techniques to Reduce Multipath Effects in S-PCN Mobile Terminals. 246-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.