By Topic

China Communications

Issue 11 • Date Nov. 2013

Filter Results

Displaying Results 1 - 25 of 25
  • [Front and back cover]

    Publication Year: 2013, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (1998 KB)
    Freely Available from IEEE
  • China Unicom [Advertisement]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1997 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (687 KB)
    Freely Available from IEEE
  • Table of content

    Publication Year: 2013, Page(s):ii - v
    Request permission for commercial reuse | PDF file iconPDF (4477 KB)
    Freely Available from IEEE
  • Identifier-based universal network architecture

    Publication Year: 2013, Page(s):vi - viii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9016 KB)

    The research team led by Prof. ZHANG Hongke at Beijing Jiaotong University, China, has created a new future Internet architecture called the Identifier-based Universal Network (IUN) architecture. The IUN is the research result of the national research project “Fundamental Research on the Architecture of Universal Network for Supporting Pervasive Services”, which was supported by the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted computing and information security

    Publication Year: 2013, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (2428 KB)
    Freely Available from IEEE
  • Protocol for trusted channel based on portable trusted module

    Publication Year: 2013, Page(s):1 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6247 KB)

    Web-based e-commerce applications need a trusted channel, which provides confidential communication, identity authentication and integrity assurance of endpoints, to guarantee the security of electronic transactions. A user-oriented trusted computing system based on Portable Trusted Module (PTM) is presented. Remote attestation is incorporated into Transport Layer Security (TLS) handshake protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OPKH: A lightweight online approach to protecting kernel hooks in kernel modules

    Publication Year: 2013, Page(s):15 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Kernel hooks are very important control data in OS kernel. Once these data are compromised by attackers, they can change the control flow of OS kernel's execution. Previous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model for software behaviour detection based on process algebra and system call

    Publication Year: 2013, Page(s):24 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (671 KB)

    Behaviour detection models based on automata have been studied widely. By adding edge ε, the local automata are combined into global automata to describe and detect software behaviour. However, these methods introduce nondeterminacy, leading to models that are imprecise or inefficient. We present a model of software Behaviour Detection based on Process Algebra and system call (BDPA). In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certificateless proxy identity-based signcryption scheme without bilinear pairings

    Publication Year: 2013, Page(s):37 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Signcryption, which was introduced by ZHENG, is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more efficient way. Certificateless signcryption and proxy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurate classification of P2P traffic by clustering flows

    Publication Year: 2013, Page(s):42 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1820 KB)

    P2P traffic has always been a dominant portion of Internet traffic since its emergence in the late 1990s. The method used to accurately classify P2P traffic remains a key problem for Internet Service Producers (ISPs) and network managers. This paper proposes a novel approach to the accurate classification of P2P traffic at a fine-grained level, which depends solely on the number of special flows d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-line-of-sight ultraviolet communication performance in atmospheric turbulence

    Publication Year: 2013, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (833 KB)

    Non-Line-of-Sight (NLOS) Ultraviolet (UV) communication uses the atmosphere as a propagation medium. As the communication range increases, turbulence becomes a significant atmospheric process that affects the propagation of optical waves. This paper presents a more accurate NLOS channel model by considering turbulence-induced Scintillation Attenuation (SA). Then, the Bit Error Rate (BER) during tu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed adaptive compressed video sensing using smoothed projected landweber reconstruction

    Publication Year: 2013, Page(s):58 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (19341 KB)

    A novel Compressed-Sensing-based (CS-based) Distributed Video Coding (DVC) system, called Distributed Adaptive Compressed Video Sensing (DISACOS), is proposed in this paper. In this system, the input frames are divided into key frames and non-key frames, which are encoded by block CS sampling. The key frames are encoded as CS measurements at substantially higher rates than the non-key frames and d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint optimal sensing threshold and subcarrier power allocation in wideband cognitive radio for minimising interference to primary user

    Publication Year: 2013, Page(s):70 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (778 KB)

    Cognitive Radio (CR) can use the frequency band allocated to a Primary User (PU) on the premise that it will prevent significant of avoiding causing great interference to the PU. In this paper, we consider a wideband CR system where the Secondary User (SU) minimises its interference to the PU by jointly allocating the optimal sensing threshold and subcarrier power. A multi-parameter optimization p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid detection and tracking of fast-flux botnet on domain name system traffic

    Publication Year: 2013, Page(s):81 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10698 KB)

    Fast-flux is a Domain Name System (DNS) technique used by botnets to organise compromised hosts into a high-availability, load-balancing network that is similar to Content Delivery Networks (CDNs). Fast-Flux Service Networks (FFSNs) are usually used as proxies of phishing websites and malwares, and hide upstream servers that host actual content. In this paper, by analysing recursive DNS traffic, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network traffic signature generation mechanism using principal component analysis

    Publication Year: 2013, Page(s):95 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1098 KB)

    The Deep Packet Inspection (DPI) method is a popular method that can accurately identify the flow data and its corresponding application. Currently, the DPI method is widely used in common network management systems. However, the major limitation of DPI systems is that their signature library is mainly extracted manually, which makes it hard to efficiently obtain the signature of new applications.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding BitTorrent through real measurements

    Publication Year: 2013, Page(s):107 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3774 KB)

    In this paper, we present the results of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: metadata files and the logs of one of the currently most popular BitTorrent clients - μTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical superposition of crosstalk effects in cable bundles

    Publication Year: 2013, Page(s):119 - 128
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (774 KB)

    This paper deals with the analytical derivation of phasor-domain statistical properties of crosstalk in random wire cables due to the superposition of several sources of electromagnetic interference. In this study, statistical characterization of crosstalk in cable bundles, which is available in literature for the case of one source of interference, is extended to the case of several sources opera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outage probability of composite microscopic and macroscopic diversity over correlated shadowed fading channels

    Publication Year: 2013, Page(s):129 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1105 KB)

    The outage probability of a composite microscopic and macroscopic diversity system is evaluated over correlated shadowed fading channels. The correlations on both a microlevel and macrolevel are taken into account for the evaluations. The expression of the desired outage probability is explicitly presented, and two evaluation approaches, i.e. a compact Gaussian-Hermite quadrature method and an eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power control algorithm of cognitive radio based on non-cooperative game theory

    Publication Year: 2013, Page(s):143 - 154
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2193 KB)

    This paper addresses the power control problems of Cognitive Radio (CR) under transmission power and interference temperature constraints. First, we propose the interference constraint which ensures that the Quality of Service (QoS) standards for primary users is considered and a non-cooperative game power control model. Based on the proposed model, we developed a logical utility function based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware scheduling algorithm in smart home system

    Publication Year: 2013, Page(s):155 - 164
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3212 KB)

    The main idea of pervasive computing is to make computing exist everywhere in the physical world. The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an intelligent life experience. The key technique used to realise this is context awareness. Contexts in the living space can provide large amounts of information regarding users' behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video events recognition by scene and group context

    Publication Year: 2013, Page(s):165 - 171
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12311 KB)

    The ability to recognise video events has become increasingly more popular owing to its extensive practical applications. Most events will occur in certain scene with certain people, and the scene context and group context provide important information for event recognition. In this paper, we present an algorithm to recognise video events in different scenes in which there are multiple agents. Fir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China Unicorn: Financial informatization

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2671 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (626 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (609 KB)
    Freely Available from IEEE

Aims & Scope

China Communications, published in English and in conformance with IEEE editorial standards, covers innovative technologies and systems in the broad field of Information- Communication Technology (ICT).

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Chen Junliang