Advanced Search



69 results found in all.
index Title
16Funneling media access control (MAC) protocol for underwater acoustic sensor networks
Author(s):Guang-yu Fan, Hui-fang Chen, Lei Xie, Kuang Wang  Clicked:10828  Download:4544  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.11 P.932-941  DOI:10.1631/jzus.C1000388
17Electromagnetic environment around a high-speed railway using analytical technique
Author(s):Yong-jian Zhi, Bin Zhang, Kai Li, Xiao-yan Huang, You-tong Fang, Wen-ping Cao  Clicked:6678  Download:4503  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2011 Vol.12 No.12 P.950-956  DOI:10.1631/jzus.A11GT004
18Resource allocation algorithm with limited feedback for multicast single frequency networks
Author(s):Ming-wei Tang, Xiao-xiang Wang  Clicked:10612  Download:4253  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.2 P.146-154  DOI:10.1631/jzus.C1100108
19Asymmetry-aware load balancing for parallel applications in single-ISA multi-core systems
Author(s):Eunsung Kim, Hyeonsang Eom, Heon Y. Yeom  Clicked:10118  Download:4007  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.6 P.413-427  DOI:10.1631/jzus.C1100198
20EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
Author(s):Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He  Clicked:9363  Download:4243  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.5 P.356-373  DOI:10.1631/jzus.C1200267
21Mobility assisted spectrum aware routing protocol for cognitive radio ad hoc networks
Author(s):Omid Abedi, Reza Berangi  Clicked:9999  Download:5921  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.873-886  DOI:10.1631/jzus.C1200334
22An analytical model for source code distributability verification
Author(s):Ayaz Isazadeh, Jaber Karimpour, Islam Elgedawy, Habib Izadkhah  Clicked:10093  Download:4695  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2014 Vol.15 No.2 P.126-138  DOI:10.1631/jzus.C1300066
23Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:11681  Download:5370  Cited:6  <Full Text>  <PPT> 2831
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
24Designing a location update strategy for free-moving and network-constrained objects with varying velocity
Author(s):Yuan-Ko Huang, Lien-Fa Lin  Clicked:10904  Download:4290  Cited:1  <Full Text>  <PPT> 2508
Journal of Zhejiang University Science C  2014 Vol.15 No.8 P.675-686  DOI:10.1631/jzus.C1300337
25Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem  Clicked:14534  Download:6479  Cited:9  <Full Text>  <PPT> 3460
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
26Max-margin based Bayesian classifier
Author(s):Tao-cheng Hu, Jin-hui Yu  Clicked:8070  Download:4728  Cited:1  <Full Text>  <PPT> 2505
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.973-981  DOI:10.1631/FITEE.1601078
27Maximizing power saving with state transition overhead for multiple mobile subscriber stations in WiMAX
Author(s):Bo Li, Sung-kwon Park  Clicked:8784  Download:4195  Cited:1  <Full Text>  <PPT> 2759
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1085-1094  DOI:10.1631/FITEE.1500314
28FlowTrace: measuring round-trip time and tracing path in software-defined networking with low communication overhead
Author(s):Shuo Wang, Jiao Zhang, Tao Huang, Jiang Liu, Yun-jie Liu, F. Richard Yu  Clicked:8999  Download:6789  Cited:0  <Full Text>  <PPT> 2615
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.2 P.206-219  DOI:10.1631/FITEE.1601280
29DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks
Author(s):Mei-juan Jia, Hui-qiang Wang, Jun-yu Lin, Guang-sheng Feng, Hai-tao Yu  Clicked:9133  Download:4222  Cited:0  <Full Text>  <PPT> 2471
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.559-569  DOI:10.1631/FITEE.1601535
30Interference coordination in full-duplex HetNet with large-scale antenna arrays
Author(s):Zhao-yang Zhang, Wei Lyu  Clicked:16088  Download:8305  Cited:1  <Full Text>  <PPT> 5985
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.830-840  DOI:10.1631/FITEE.1700047
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE