


default search action
Communications and Network, Volume 2
Volume 2, Number 1, February 2010
- Chunjie Chen, Chao Jin, Demin Li, Jiacun Wang, Jianan Fang:

Using the Power Control and Cooperative Communication for Energy Saving in Mobile Ad Hoc Networks. 1-10 - Jin Young Choi:

A Comparison Study of Input ESD Protection Schemes Utilizing NMOS, Thyristor, and Diode Devices. 11-25 - Lorenzo Iorio

:
On Possible A-Priori "Imprinting" of General Relativity Itself on the Performed Lense-Thirring Tests with LAGEOS Satellites. 26-30 - Tadeusz Wibig

:
Neural Network Performance for Complex Minimization Problem. 31-37 - Zhijin Zhao, Zhen Peng, Zhidong Zhao, Shilian Zheng:

Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint. 38-43 - Xiaolu Li, Yuesong Jiang, Lijun Xu:

A Historical Narrative of Study of Fiber Grating Solitons. 44-49 - Chunhe Song, Hai Zhao, Wei Jing, Dan Liu:

ADPF Algorithm for Target Tracking in WSN. 50-53 - Hari Om, Tapas K. Sarkar:

Designing Intrusion Detection System for Web Documents Using Neural Network. 54-61 - R. P. Martínez-y-Romero, H. N. Núnez-Yépez, A. L. Salas-Brito:

On Solvable Potentials, Supersymmetry, and the One-Dimensional Hydrogen Atom. 62-64 - Tomasz Dlugosz

, Hubert Trzaska:
How to Measure in the Near Field and in the Far Field. 65-68 - Munir B. Sayyad, Abhik Chatterjee, Sanjay L. Nalbalwar:

Proposed Model for SIP Security Enhancement. 69-72 - Meeru Chaudhri, A. Vohra, S. K. Chakarvarti:

A Model for Cu-Se Resonant Tunneling Diodes Fabricated by Negative Template Assisted Electrodeposition Technique. 73-78 - Satish Chand:

Live Video Services Using Fast Broadcasting Scheme. 79-85
Volume 2, Number 2, May 2010
- Hao Niu, Taiyi Zhang, Li Sun:

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks. 87-92 - Mingxiang Guan, Fang Yuan, Xueyuan Wan, Weizhi Zhong:

Method of Carrier Acquisition and Track for HAPS. 93-96 - Hamid-Reza Bahrami, Tho Le-Ngoc:

Maximum Ratio Combining Precoding for Multi-Antenna Relay Systems. 97-103 - Zheng Teng, Ki-Il Kim:

A Survey on Real-Time MAC Protocols in Wireless Sensor Networks. 104-112 - Peter Vorobiyenko, Kirill Dmitry Guliaiev, Dmitry Anatoly Zaitsev

, Tatiana R. Shmeleva:
PBB Efficiency Evaluation via Colored Petri Net Models. 113-124 - Alain Bertrand Bomgni, Jean Frédéric Myoupo

:
An Energy-Efficient Clique-Based Geocast Algorithm for Dense Sensor Networks. 125-133 - Sanjay P. Ahuja, Nicole Collier:

An Assessment of WiMax Security. 134-137 - Iqbal Husain, Rumana G. Mattoo:

Multiobjective Duality in Variational Problems with Higher Order Derivatives. 138-144
Volume 2, Number 3, August 2010
- Sheng Chen, Lie-Liang Yang:

Downlink MBER Transmit Beamforming Design Based on Uplink MBER Receive Beamforming for TDD-SDMA Induced MIMO Systems. 145-151 - Stephen Hurley, Leigh Hodge:

Compromise in CDMA Network Planning. 152-161 - Amandeep Singh Sappal, Manjeet Singh Patterh, Sanjay Sharma:

A Novel Black Box Based Behavioral Model of Power Amplifier for WCDMA Applications. 162-165 - Fabio Garzia, Roberto Cusani:

Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution. 166-182 - Sanjay Ahuja, Pavan Potti:

An Introduction to RFID Technology. 183-186 - Ying Zheng:

A Security Transfer Model Based on Active Defense Strategy. 187-192 - Fabio Garzia, Cristina Perna, Roberto Cusani:

Optimization of UMTS Network Planning Using Genetic Algorithms. 193-199 - Sanjay Ahuja, Je-Loon Yang:

Performance Evaluation of Java Web Services: A Developer's Perspective. 200-206
Volume 2, Number 4, November 2010
- David Bermingham, Zhen Liu, Xiaojun Wang:

SimNP: A Flexible Platform for the Simulation of Network Processing Systems. 207-215 - Ilya M. Averin, Victor T. Ermolayev, Alexander G. Flaksman:

Locating Mobile Users Using Base Stations of Cellular Networks. 216-220 - My Abdelkader Youssefi, Jamal El Abbadi:

Optimal Spacing Design for Pilots in OFDM Systems over Multipath Fading Channels. 221-229 - Jing Feng, Ruoshan Kong, Yulin Wang:

A Novel Digital Rights Management Scheme in P2P Networks. 230-234 - Fabio Garzia, Roberto Cusani:

All-Optical Cryptographic Device for Secure Communication. 235-245 - Sunday E. Iwasokun, Michael O. Kolawole:

USING Hybrid Adaptive Techniques to Reduce Multipath Effects in S-PCN Mobile Terminals. 246-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














