International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)
DOI: 10.5815/ijwmt
Published By: MECS Press
IJWMT Vol. 1, No. 2, Apr. 2011
Cover page and Table of Contents: PDF (size: 116KB)
Contents
REGULAR PAPERS
-
Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems
GAO Shou-ping,WANG Lu-da
Abstract | References | Full Paper: PDF (Size:169KB), PP.1-7, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.01
-
Demand-Driven Dynamic Spectrum Allocation in Heterogeneous Cellular Networks
Li Wang,Huiyue Yi,Honglin Hu,Jianan Liu,Bin Chen
Abstract | References | Full Paper: PDF (Size:236KB), PP.8-15, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.02
-
A Weighed Least Square TDOA Location Algorithm for TDMA Multi-target
WANG XU,HE ZI-SHU
Abstract | References | Full Paper: PDF (Size:222KB), PP.16-25, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.03
-
Research of NCS Real-time Performance with Judging Priority Based on Generalized Stability
Hengrong LU
Abstract | References | Full Paper: PDF (Size:165KB), PP.26-32, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.04
-
A Novel Approach to Simulate DDoS Attack
Qing LI,LeJun CHI,ZhaoXin ZHANG
Abstract | References | Full Paper: PDF (Size:618KB), PP.33-40, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.05
-
Fast Matching Algorithm Based on Fingerprint Classification Information
Na Li,Wenbi Rao,Tiecheng Xu
Abstract | References | Full Paper: PDF (Size:200KB), PP.41-46, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.06
-
Discussion on IGMP Snooping and Its Sequence in Industrial Applicaiton
Sheng LU,Chuan WEN
Abstract | References | Full Paper: PDF (Size:203KB), PP.47-54, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.07
-
A Speech Enhancement Method Based on Kalman Filtering
Chaogang Wu,Bo Li,Jin Zheng
Abstract | References | Full Paper: PDF (Size:178KB), PP.55-61, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.08
-
An Incentive Compatible Reputation Model for P2P Networks
Jianli Hu,Bin Zhou
Abstract | References | Full Paper: PDF (Size:440KB), PP.62-69, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.09
-
A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack
Wenbing Wang,Zhifeng Zhang
Abstract | References | Full Paper: PDF (Size:157KB), PP.70-74, Pub. Date: 2011-04-15
DOI: 10.5815/ijwmt.2011.02.10