Scientific Research An Academic Publisher
OPEN ACCESS
Volume 3, Number 10, October 2010 (Special Issue on )
Cover Page, Table of Contents and Others: PDF (size: 3403KB)
A Turbo Decoder Included in a Multi-User Detector: A Solution to be Retained
Sylvie Kerouédan, Makram Touzri, Patrick Adde, Samir Saoudi
Abstract | References Full-Text HTML Pub. Date: October 27, 2010
DOI: 10.4236/ijcns.2010.310112 4,171 Downloads 8,104 Views Citations
Using Least Squares Support Vector Machines for Frequency Estimation
Xiaoyun Teng, Xiaoyi Zhang, Hongyi Yu
DOI: 10.4236/ijcns.2010.310111 4,701 Downloads 8,591 Views Citations
Reliable Multicast with Network Coding in Lossy Wireless Networks
Wei Yan, Shengyu Yu, Yueming Cai
DOI: 10.4236/ijcns.2010.310110 4,250 Downloads 7,772 Views Citations
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO
Nannan Wang, Zhiyi Fang, Kaige Yan, Yu Tang, Xingchao An
DOI: 10.4236/ijcns.2010.310109 3,803 Downloads 7,174 Views Citations
Performance Improvement of Wireless Communications Using Frequency Hopping Spread Spectrum
Naser Hossein Motlagh
DOI: 10.4236/ijcns.2010.310108 7,243 Downloads 14,177 Views Citations
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
Shuhong Jiao, Robert Goutte
DOI: 10.4236/ijcns.2010.310107 6,095 Downloads 10,121 Views Citations
Winning Strategies and Complexity of Nim-Type Computer Game on Plane
Boris S. Verkhovsky
DOI: 10.4236/ijcns.2010.310106 4,868 Downloads 8,671 Views Citations
Block Layering Approach in TAST Codes
Zahoor Ahmed, Jean Pierre Cances, Vahid Meghdadi
DOI: 10.4236/ijcns.2010.310105 4,569 Downloads 7,683 Views Citations
A Comparative Analysis of Tools for Verification of Security Protocols
Nitish Dalal, Jenny Shah, Khushboo Hisaria, Devesh Jinwala
DOI: 10.4236/ijcns.2010.310104 6,229 Downloads 13,097 Views Citations
● Open Special Issues
● Published Special Issues
● Special Issues Guideline