Scientific Research An Academic Publisher
OPEN ACCESS
International Journal of Communications, Network and System Sciences
Volume 3, Number 10, October 2010 (Special Issue on )
Cover Page, Table of Contents and Others: PDF (size: 3403KB)
A Turbo Decoder Included in a Multi-User Detector: A Solution to be Retained ()
Sylvie Kerouédan, Makram Touzri, Patrick Adde, Samir Saoudi
Int'l J. of Communications, Network and System Sciences Vol.3 No.10, October 27, 2010
DOI: 10.4236/ijcns.2010.310112 4,360 Downloads 8,318 Views Citations This article belongs to the Special Issue on
Using Least Squares Support Vector Machines for Frequency Estimation ()
Xiaoyun Teng, Xiaoyi Zhang, Hongyi Yu
DOI: 10.4236/ijcns.2010.310111 4,920 Downloads 8,863 Views Citations This article belongs to the Special Issue on
Reliable Multicast with Network Coding in Lossy Wireless Networks ()
Wei Yan, Shengyu Yu, Yueming Cai
DOI: 10.4236/ijcns.2010.310110 4,399 Downloads 7,957 Views Citations This article belongs to the Special Issue on
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO ()
Nannan Wang, Zhiyi Fang, Kaige Yan, Yu Tang, Xingchao An
DOI: 10.4236/ijcns.2010.310109 3,976 Downloads 7,355 Views Citations This article belongs to the Special Issue on
Performance Improvement of Wireless Communications Using Frequency Hopping Spread Spectrum ()
Naser Hossein Motlagh
DOI: 10.4236/ijcns.2010.310108 7,616 Downloads 14,673 Views Citations This article belongs to the Special Issue on
A Secure Transfer of Identification Information in Medical Images by Steganocryptography ()
Shuhong Jiao, Robert Goutte
DOI: 10.4236/ijcns.2010.310107 6,277 Downloads 10,335 Views Citations This article belongs to the Special Issue on
Winning Strategies and Complexity of Nim-Type Computer Game on Plane ()
Boris S. Verkhovsky
DOI: 10.4236/ijcns.2010.310106 5,151 Downloads 8,964 Views Citations This article belongs to the Special Issue on
Block Layering Approach in TAST Codes ()
Zahoor Ahmed, Jean Pierre Cances, Vahid Meghdadi
DOI: 10.4236/ijcns.2010.310105 4,739 Downloads 7,850 Views Citations This article belongs to the Special Issue on
A Comparative Analysis of Tools for Verification of Security Protocols ()
Nitish Dalal, Jenny Shah, Khushboo Hisaria, Devesh Jinwala
DOI: 10.4236/ijcns.2010.310104 6,612 Downloads 13,655 Views Citations This article belongs to the Special Issue on
● Open Special Issues
● Published Special Issues
● Special Issues Guideline