Search dblp for Publications

export results for "stream:streams/conf/wcnis:"

 download as .bib file

@inproceedings{DBLP:conf/wcnis/Ababneh10,
  author    = {Nedal Ababneh},
  title     = {Evaluation of On/Off scheduling protocols for ad hoc and sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {419--423},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544122},
  doi       = {10.1109/WCINS.2010.5544122},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Ababneh10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/AbabnehL10,
  author    = {Nedal Ababneh and
               Houda Labiod},
  title     = {A performance analysis of VANETs routing protocols using different
               mobility models},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {498--502},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541720},
  doi       = {10.1109/WCINS.2010.5541720},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/AbabnehL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/AlShaalanAA10,
  author    = {Furaih AlShaalan and
               Saleh AlShebeili and
               Abdulkareem Adinoyi},
  title     = {Interference-aware radio resource allocation techniques for OFDMA-based
               wireless networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {546--550},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544145},
  doi       = {10.1109/WCINS.2010.5544145},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/AlShaalanAA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/AlexandrovaSOT10,
  author    = {Todorka Alexandrova and
               Yoshiaki Suzuki and
               Kan Okubo and
               Norio Tagawa},
  title     = {Secret images sharing scheme using two-variable one-way functions},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {553--557},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541840},
  doi       = {10.1109/WCINS.2010.5541840},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/AlexandrovaSOT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/AnLH10,
  author    = {Ning An and
               Bingbing Li and
               Min Huang},
  title     = {Research on modulation classification using empirical mode decomposition
               method},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {211--214},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541922},
  doi       = {10.1109/WCINS.2010.5541922},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/AnLH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/AnithaS10,
  author    = {V. S. Anitha and
               M. P. Sebastian},
  title     = {A connected dominating set-based weighted clustering algorithm for
               wireless sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {530--534},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544142},
  doi       = {10.1109/WCINS.2010.5544142},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/AnithaS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Au-YeungZZ10,
  author    = {Jeff Siu{-}Kei Au{-}Yeung and
               Shuyuan Zhu and
               Bing Zeng},
  title     = {Quality assessment for a perceptual video encryption system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {102--106},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541898},
  doi       = {10.1109/WCINS.2010.5541898},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Au-YeungZZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/BaekKFC10,
  author    = {Jinsuk Baek and
               Cheonshik Kim and
               Paul S. Fisher and
               Hongyang Chao},
  title     = {(N, 1) secret sharing approach based on steganography with gray digital
               images},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {325--329},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541793},
  doi       = {10.1109/WCINS.2010.5541793},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/BaekKFC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/BaiDMSZC10,
  author    = {Yong Bai and
               Wencai Du and
               Zhengxin Ma and
               Chong Shen and
               Youling Zhou and
               Baodan Chen},
  title     = {Emergency communication system by heterogeneous wireless networking},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {488--492},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541719},
  doi       = {10.1109/WCINS.2010.5541719},
  timestamp = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wcnis/BaiDMSZC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/BasGM10,
  author    = {Joan Bas and
               Ismael Guti{\'{e}}rrez and
               Alain Mourad},
  title     = {Performance of {NB-LDPC} and {DBTC} codes with channel estimation
               and {SNR} mismatch},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {260--264},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541933},
  doi       = {10.1109/WCINS.2010.5541933},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/BasGM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/BhattarRD10,
  author    = {Raghunadh K. Bhattar and
               K. R. Ramakrishnan and
               Kankar S. Dasgupta},
  title     = {On computation of minimum distance of linear block codes above 1/2
               rate coding},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {280--284},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541937},
  doi       = {10.1109/WCINS.2010.5541937},
  timestamp = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wcnis/BhattarRD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Bizaki10,
  author    = {Hossein Khaleghi Bizaki},
  title     = {Tomlinson-Harashima precoding optimization over correlated {MIMO}
               channels},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {207--211},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541731},
  doi       = {10.1109/WCINS.2010.5541731},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Bizaki10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Bizaki10a,
  author    = {Hossein Khaleghi Bizaki},
  title     = {Channel imperfection effects on {THP} performance in a slowly time
               varying {MIMO} channels},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {212--216},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541732},
  doi       = {10.1109/WCINS.2010.5541732},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Bizaki10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/BogonikolosMK10,
  author    = {Nikolaos Bogonikolos and
               Georgios Mantas and
               Giorgos Kostopoulos},
  title     = {{ARATOS:} An intelligent machine-to-machine framework for services
               based on satellite Earth Observation data},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {338--342},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542314},
  doi       = {10.1109/WCINS.2010.5542314},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/BogonikolosMK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/CaiW10,
  author    = {Hongmin Cai and
               Naiqi Wu},
  title     = {Design and implementation of a {DIDS}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {340--342},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541796},
  doi       = {10.1109/WCINS.2010.5541796},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/CaiW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChangGH10,
  author    = {Lulu Chang and
               Chao Guo and
               Yongsheng Hu},
  title     = {The analysis and research of selfish question in p2p},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {445--448},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541817},
  doi       = {10.1109/WCINS.2010.5541817},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChangGH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChauhanT10,
  author    = {Kamal Kumar Chauhan and
               Shashikala Tapaswi},
  title     = {A secure key management system in group structured mobile ad hoc networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {307--311},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541789},
  doi       = {10.1109/WCINS.2010.5541789},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChauhanT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Chen10,
  author    = {Wenping Chen},
  title     = {VANETs-based real-time traffic data dissemination},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {468--472},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544131},
  doi       = {10.1109/WCINS.2010.5544131},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Chen10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenCL10,
  author    = {Zujue Chen and
               Jie Cao and
               Shaoqing Liu},
  title     = {A fast motion estimation optimization for {H.264/AVC} encoder},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {116--119},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541901},
  doi       = {10.1109/WCINS.2010.5541901},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenCL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenCZHWT10,
  author    = {Bin Chen and
               Peng Cai and
               Yong Zhang and
               Jian Huang and
               Yun{-}Song Wu and
               Jun Tang},
  title     = {Research on autocorrelation of chaotic sequence by phase space method},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {6--12},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541875},
  doi       = {10.1109/WCINS.2010.5541875},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenCZHWT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenDLJLZL10,
  author    = {Zhen Chen and
               Fachao Deng and
               An'an Luo and
               Xin Jiang and
               Guo{-}Dong Li and
               Run{-}hua Zhang and
               Chuang Lin},
  title     = {Application level network access control system based on {TNC} architecture
               for enterprise network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {667--671},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541863},
  doi       = {10.1109/WCINS.2010.5541863},
  timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenDLJLZL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenJS10,
  author    = {Weifeng Chen and
               Jianchun Jiang and
               Nancy Skocik},
  title     = {On the privacy protection in publish/subscribe systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {597--601},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541849},
  doi       = {10.1109/WCINS.2010.5541849},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenJS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenL10,
  author    = {Jinyuan Chen and
               Jingyang Lu},
  title     = {Multi-cell and multi-user detection in uplink for {MIMO} systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {23--27},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544050},
  doi       = {10.1109/WCINS.2010.5544050},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenLLL10,
  author    = {Rui Chen and
               Jiandong Li and
               Wei Liu and
               Jian Li},
  title     = {Inter-carrier cooperative coding/decoding for {OFDM} systems using
               geometric mean decomposition},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {1--3},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544053},
  doi       = {10.1109/WCINS.2010.5544053},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenLLL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenOLR10,
  author    = {Ling Chen and
               Thomas Ostertag and
               Marc Loschonsky and
               Leonhard M. Reindl},
  title     = {Measurement of mobile radio propagation channel in ruins},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {252--256},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541724},
  doi       = {10.1109/WCINS.2010.5541724},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenOLR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenSH10,
  author    = {Changlong Chen and
               Min Song and
               George Hsieh},
  title     = {Intrusion detection of sinkhole attacks in large-scale wireless sensor
               networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {711--716},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541872},
  doi       = {10.1109/WCINS.2010.5541872},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenSH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenX10,
  author    = {Shengjian Chen and
               Lei Xu},
  title     = {A boundary-scan test bus controller design for mixed-signal test},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {22--25},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541878},
  doi       = {10.1109/WCINS.2010.5541878},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChenZL10,
  author    = {Wenbai Chen and
               Xiaoqin Zhang and
               Wei Li},
  title     = {An scheme improved on iterative detection algorithm for {V-BLAST}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {151--154},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541743},
  doi       = {10.1109/WCINS.2010.5541743},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChenZL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Cheng10,
  author    = {Qi Cheng},
  title     = {Exploitation of known short and long symbols for carrier frequency
               offset estimation in {OFDM} wireless {LAN} systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {150--153},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541909},
  doi       = {10.1109/WCINS.2010.5541909},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Cheng10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ChoudhryZQ10,
  author    = {Muhammad Aamir Saleem Choudhry and
               Muhammad Zubair and
               Ijaz Mansoor Qureshi},
  title     = {Particle swarm optimization based {MUD} for overloaded {MC-CDMA} system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541874},
  doi       = {10.1109/WCINS.2010.5541874},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ChoudhryZQ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ClausenH10,
  author    = {Thomas H. Clausen and
               Ulrich Herberg},
  title     = {Vulnerability analysis of the optimized link state routing protocol
               version 2 (OLSRv2)},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {628--633},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544732},
  doi       = {10.1109/WCINS.2010.5544732},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ClausenH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ConnellTG10,
  author    = {Wesley Connell and
               Dan Tamir and
               Mina Guirguis},
  title     = {Prime-based mimic functions for the implementation of covert channels},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {538--543},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541837},
  doi       = {10.1109/WCINS.2010.5541837},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ConnellTG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/CuiL10,
  author    = {Guang{-}zhao Cui and
               Hao{-}bin Li},
  title     = {The design of localization in wireless sensor network node based on
               {JENNIC} platform},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {45--48},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541767},
  doi       = {10.1109/WCINS.2010.5541767},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/CuiL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DaiG10,
  author    = {Zhi{-}min Dai and
               Lu Guo},
  title     = {Growth customer information mining analysis with association rules
               in On-line financial Web site},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {587--591},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541847},
  doi       = {10.1109/WCINS.2010.5541847},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DaiG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DaiSC10,
  author    = {Liang Dai and
               Xuekang Sun and
               Hao Chen},
  title     = {A new Selective Signal Detection based on Iterative Joint Channel
               Estimation in {MIMO-OFDM} systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {80--84},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541893},
  doi       = {10.1109/WCINS.2010.5541893},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DaiSC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DaiWY10,
  author    = {Songyin Dai and
               Tao Wu and
               Sijie Yuan},
  title     = {Particle filtering for blind equalization using the optical importance
               function},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {224--228},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541925},
  doi       = {10.1109/WCINS.2010.5541925},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DaiWY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DingHJ10,
  author    = {Jupeng Ding and
               Zhitong Huang and
               Yuefeng Ji},
  title     = {Indoor white light wireless data transmission based on new generation
               environment-friendly solid state lighting},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {87--91},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541760},
  doi       = {10.1109/WCINS.2010.5541760},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DingHJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DingX10,
  author    = {Zhe Ding and
               Yubin Xu},
  title     = {A novel spatial Dynamic Spectrum Allocation in the urban heterogeneous
               scenario},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {387--391},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543729},
  doi       = {10.1109/WCINS.2010.5543729},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DingX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DingY10,
  author    = {Zhehan Ding and
               N. Yamauchi},
  title     = {An improvement of energy efficient multi-hop time synchronization
               algorithm in wireless sensor network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {116--120},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541751},
  doi       = {10.1109/WCINS.2010.5541751},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DingY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DuMN10,
  author    = {Wan Du and
               Fabien Mieyeville and
               David Navarro},
  title     = {{IDEA1:} {A} SystemC-based system-level simulator for wireless sensor
               networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {618--622},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544546},
  doi       = {10.1109/WCINS.2010.5544546},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DuMN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DuP10,
  author    = {Yusong Du and
               Dingyi Pei},
  title     = {Count of annihilators of Boolean functions with given algebraic immunity},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {640--643},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541858},
  doi       = {10.1109/WCINS.2010.5541858},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DuP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/DuanL10,
  author    = {Jiaqi Duan and
               Yong Li},
  title     = {A novel cooperative spectrum sensing scheme based on clustering and
               softened hard combination},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {183--187},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541738},
  doi       = {10.1109/WCINS.2010.5541738},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/DuanL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/EssaddiHB10,
  author    = {Nejla Essaddi and
               Mohamed Hamdi and
               Noureddine Boudriga},
  title     = {A new tracking-aware gossiping scheme for Wireless Sensor Networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {349--354},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544147},
  doi       = {10.1109/WCINS.2010.5544147},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/EssaddiHB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/FanYW10,
  author    = {Zi{-}fu Fan and
               Zhang Yi and
               Xiao{-}Yu Wan},
  title     = {An improved security authentication mechanism for Parlay/OSA Framework
               based on {SSLTLS}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {441--444},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541816},
  doi       = {10.1109/WCINS.2010.5541816},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/FanYW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/FanYX10,
  author    = {Chunlong Fan and
               Zhouhua Yu and
               Lei Xu},
  title     = {Objective evaluation of Spider Detection Techniques},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {544--548},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541838},
  doi       = {10.1109/WCINS.2010.5541838},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/FanYX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/FarF10,
  author    = {Leila Mortazavi Far and
               Zahra Firouzi},
  title     = {New algorithm for fractional channel reservation in limited fractional
               gurad channel policy},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {613--617},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544549},
  doi       = {10.1109/WCINS.2010.5544549},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/FarF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/FengCD10,
  author    = {Qunchao Feng and
               Yuanzhi Chen and
               Weitao Du},
  title     = {An improved feedback cancelling method for on-channel repeater},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {158--161},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541911},
  doi       = {10.1109/WCINS.2010.5541911},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/FengCD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/FuHY10,
  author    = {Jianxin Fu and
               Lianfen Huang and
               Yan Yao},
  title     = {Application of {BP} neural network in wireless network security evaluation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {592--596},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541848},
  doi       = {10.1109/WCINS.2010.5541848},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/FuHY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/GodorGI10,
  author    = {Gy{\"{o}}z{\"{o}} G{\'{o}}dor and
               Norbert Giczi and
               S{\'{a}}ndor Imre},
  title     = {Elliptic curve cryptography based mutual authentication protocol for
               low computational capacity {RFID} systems - performance analysis by
               simulations},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {650--657},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541860},
  doi       = {10.1109/WCINS.2010.5541860},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/GodorGI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/GuanDGZ10,
  author    = {Weiguo Guan and
               Zhongliang Deng and
               Yuetao Ge and
               Dejun Zou},
  title     = {A practical {TDOA} positioning method for {CDMA2000} mobile network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {126--129},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541749},
  doi       = {10.1109/WCINS.2010.5541749},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/GuanDGZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/GuanHWY10,
  author    = {Zhitao Guan and
               Jietao He and
               Kehe Wu and
               Shuai Yuan},
  title     = {Research on a Behavior-based active controllable defense model and
               its application},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {687--691},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541867},
  doi       = {10.1109/WCINS.2010.5541867},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/GuanHWY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/GuoWLKS10,
  author    = {Haizheng Guo and
               Bo Wang and
               Bangli Liang and
               Tad A. Kwasniewski and
               Robert Sobot},
  title     = {Optimized {LNA} for analog {RF} front-end circuit in brain-machine
               interface},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {147--150},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541746},
  doi       = {10.1109/WCINS.2010.5541746},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/GuoWLKS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/GuoXNYL10,
  author    = {Chengqing Guo and
               Guoai Xu and
               Xinxin Niu and
               Yixian Yang and
               Yang Li},
  title     = {A color image watermarking algorithm resistant to print-scan},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {518--521},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541833},
  doi       = {10.1109/WCINS.2010.5541833},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/GuoXNYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HamdiB10,
  author    = {Mohamed Hamdi and
               Noureddine Boudriga},
  title     = {Content-based network filtering of encrypted image data},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {343--348},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541797},
  doi       = {10.1109/WCINS.2010.5541797},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HamdiB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HanHW10,
  author    = {Wei Han and
               Jianguo Huang and
               Fangfei Wu},
  title     = {A modified Min-Sum algorithm for low-density parity-check codes},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {449--451},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541818},
  doi       = {10.1109/WCINS.2010.5541818},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HanHW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HaoXH10,
  author    = {Wu Hao and
               Qiao Xiao{-}qiang and
               Zhao Hang{-}sheng},
  title     = {A new approach to improve the spectrum sensing in distributed multi-sensor
               networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {514--518},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541886},
  doi       = {10.1109/WCINS.2010.5541886},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HaoXH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HaroonRA10,
  author    = {Farah Haroon and
               Haroon Rasheed and
               Kazi M. Ahmed},
  title     = {An adaptive srake reception of biorthogonal {IR-TH} {UWB} signals
               in {IEEE} 802.15.4a industrial {NLOS} environment},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {237--241},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541725},
  doi       = {10.1109/WCINS.2010.5541725},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HaroonRA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/He10,
  author    = {Qing He},
  title     = {A novel vertical handoff decision algorithm in heterogeneous wireless
               networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {566--570},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544150},
  doi       = {10.1109/WCINS.2010.5544150},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/He10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HeZ10,
  author    = {Tao He and
               Hao Zhong},
  title     = {Periodic sequence in netflow recognizing algorithm},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {573--576},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541844},
  doi       = {10.1109/WCINS.2010.5541844},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HeZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HongL10,
  author    = {Sunghyuck Hong and
               Sunho Lim},
  title     = {Analysis of attack models via Unified Modeling Language in Wireless
               Sensor Networks: {A} survey study},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {692--696},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541868},
  doi       = {10.1109/WCINS.2010.5541868},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HongL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HsiaoSCZ10,
  author    = {Shun{-}Wen Hsiao and
               Yeali S. Sun and
               Meng Chang Chen and
               Hui Zhang},
  title     = {Behavior profiling for robust anomaly detection},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {465--471},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541822},
  doi       = {10.1109/WCINS.2010.5541822},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HsiaoSCZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HsuCH10,
  author    = {Chih{-}Shun Hsu and
               Yuh{-}Shyan Chen and
               Chih{-}En He},
  title     = {An efficient dynamic adjusting {MAC} protocol for multichannel cognitive
               wireless networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {556--560},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544148},
  doi       = {10.1109/WCINS.2010.5544148},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HsuCH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuSYL10,
  author    = {Jing Hu and
               Lianfeng Shen and
               Yang Yang and
               Ruichao Lv},
  title     = {Design and implementation of wireless sensor and actor network for
               precision agriculture},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {571--575},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544151},
  doi       = {10.1109/WCINS.2010.5544151},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuSYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuWLP10,
  author    = {D. Y. Hu and
               Morris M. Z. Wang and
               Francis Chung{-}Ming Lau and
               Q. C. Peng},
  title     = {On the design of low complexity decoding {(LCD)} network codes},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {269--273},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541935},
  doi       = {10.1109/WCINS.2010.5541935},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuWLP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuWLW10,
  author    = {Xin Hu and
               Gang Wang and
               JiRun Luo and
               Zhicheng Wang},
  title     = {A type of {TWTA} predistortion linearizer for space telecommunication
               applications},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {77--79},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541892},
  doi       = {10.1109/WCINS.2010.5541892},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuWLW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuZ10,
  author    = {Die Hu and
               Xiaolin Zhou},
  title     = {A new pilot design method for {OFDM} systems with virtual subcarriers},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {73--77},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541761},
  doi       = {10.1109/WCINS.2010.5541761},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Huang10,
  author    = {Xiaopeng Huang},
  title     = {Capacity criterion-based power loading for underwater acoustic {OFDM}
               system with limited feedback},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {54--58},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541765},
  doi       = {10.1109/WCINS.2010.5541765},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Huang10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuangBZ10,
  author    = {Shao{-}Lun Huang and
               Yufei W. Blankenship and
               Lizhong Zheng},
  title     = {The design of binary shaping filter of binary code},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {228--232},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541727},
  doi       = {10.1109/WCINS.2010.5541727},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuangBZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuangJY10,
  author    = {Xiaomeng Huang and
               Nan Jiang and
               Jinzhe Yang},
  title     = {A cross-layer flow control algorithm over {HSDPA} networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {317--321},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542310},
  doi       = {10.1109/WCINS.2010.5542310},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuangJY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuangL10,
  author    = {Cao Huang and
               Falin Liu},
  title     = {A distributed class-based alternative routing under a congestion control
               architecture for {LEO} satellite networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {431--435},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544124},
  doi       = {10.1109/WCINS.2010.5544124},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuangL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuangTW10,
  author    = {Kewu Huang and
               Ran Tao and
               Yue Wang},
  title     = {Study of frequency domain equalization for chirp spread spectrum systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {132--136},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541905},
  doi       = {10.1109/WCINS.2010.5541905},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuangTW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/HuangYTHX10,
  author    = {Yanbin Huang and
               Shoubao Yang and
               Da Teng and
               Weiqing He and
               Lihua Xie},
  title     = {A Fair Rate-Balance link Scheduling in WiMAX Mesh network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {355--359},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544135},
  doi       = {10.1109/WCINS.2010.5544135},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/HuangYTHX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ImranYSH10,
  author    = {Muhammad Imran and
               Mohamed F. Younis and
               Abas Md Said and
               Halabi Hasbullah},
  title     = {Volunteer-instigated connectivity restoration algorithm for Wireless
               Sensor and Actor Networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {679--683},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544679},
  doi       = {10.1109/WCINS.2010.5544679},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ImranYSH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JiFM10,
  author    = {Liping Ji and
               Yu Fan and
               Chuan Ma},
  title     = {Covert channel for local area network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {316--319},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541791},
  doi       = {10.1109/WCINS.2010.5541791},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JiFM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JiangDJW10,
  author    = {Hua Jiang and
               Xianru Du and
               Yongxing Jia and
               Weizhi Wang},
  title     = {An identity-based security mechanism for {P2P} VoIP},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {481--485},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541825},
  doi       = {10.1109/WCINS.2010.5541825},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JiangDJW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JiangWJ10,
  author    = {You{-}fu Jiang and
               Guanghui Wang and
               Hai{-}yang Jin},
  title     = {Dual-channel power controlled backoff based on geographic location
               in Ad Hoc networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {343--348},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542315},
  doi       = {10.1109/WCINS.2010.5542315},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JiangWJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JiangWJ10a,
  author    = {You{-}fu Jiang and
               Guanghui Wang and
               Hai{-}yang Jin},
  title     = {A heuristic protocol combined location service in geographic ad hoc
               routing},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {576--582},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543111},
  doi       = {10.1109/WCINS.2010.5543111},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JiangWJ10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JiangZ10,
  author    = {Haisheng Jiang and
               Sidong Zhang},
  title     = {Research on the Multihoming Scheme in a Loc/ID split context},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {522--527},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541834},
  doi       = {10.1109/WCINS.2010.5541834},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JiangZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JiangZJL10,
  author    = {Hua Jiang and
               Rui Zhang and
               Yongxing Jia and
               Shanming Liu},
  title     = {A distributed key management scheme based on {SGC-PKC} for {P2P} network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {491--495},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541827},
  doi       = {10.1109/WCINS.2010.5541827},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JiangZJL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JibraelMY10,
  author    = {Fawwaz J. Jibrael and
               Wafaa S. Mummo and
               Mahmoud T. Yaseen},
  title     = {Multiband cross fractal dipole antenna for {UHF} and {SHF} applications},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {219--223},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541924},
  doi       = {10.1109/WCINS.2010.5541924},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JibraelMY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JibrilTAT10,
  author    = {Mubarak Jibril and
               Martin Tomlinson and
               Mohammed Zaki Ahmed and
               Cen Tjhai},
  title     = {Improvements on codes in non binary fields using generalised algebraic
               geometry codes},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {202--205},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541920},
  doi       = {10.1109/WCINS.2010.5541920},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JibrilTAT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JinJYJZ10,
  author    = {Taobin Jin and
               Jie Jin and
               Ruipu Yao and
               Hongmeng Ji and
               Yizhen Zhang},
  title     = {Transmission properties study of {PDGS} with defected triangles},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {37--40},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541769},
  doi       = {10.1109/WCINS.2010.5541769},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JinJYJZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/JinY10,
  author    = {Shunfu Jin and
               Wuyi Yue},
  title     = {Performance evaluation of self-similar traffic in multimedia wireless
               communication networks with power saving class type {III} in {IEEE}
               802.16e},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {436--440},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544125},
  doi       = {10.1109/WCINS.2010.5544125},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/JinY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/KaiserAS10,
  author    = {M. Shamim Kaiser and
               Kazi M. Ahmed and
               Raza Ali Shah},
  title     = {Power allocation in OFDM-based cognitive relay networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {202--206},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541734},
  doi       = {10.1109/WCINS.2010.5541734},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/KaiserAS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/KashihaAS10,
  author    = {Mahdi Kashiha and
               Mehrdad Ardebilipour and
               Ehsan Soleimani{-}Nasab},
  title     = {An adaptive method for multi-user {MIMO} power controlled systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {68--72},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541764},
  doi       = {10.1109/WCINS.2010.5541764},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/KashihaAS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/KeXZ10,
  author    = {Qi Ke and
               Dongqing Xie and
               Dafang Zhang},
  title     = {A robust watermarking scheme for 3D point cloud models using self-similarity
               partition},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {287--291},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541785},
  doi       = {10.1109/WCINS.2010.5541785},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/KeXZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/KhodadadKSAT10,
  author    = {Farid Samsami Khodadad and
               S. B. Hoseini Karani and
               A. Safaei and
               M. Hadi Karami Ata and
               Ali Taheri},
  title     = {The direction of arrival estimation in {DS-CDMA} systems employing
               the code-matched filters and parallel {ESPRIT} algorithms},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {274--279},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541936},
  doi       = {10.1109/WCINS.2010.5541936},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/KhodadadKSAT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/KunzWS10,
  author    = {Christopher Kunz and
               Jan Wiebelitz and
               Matthew Smith},
  title     = {An attack-resilient Grid auditing infrastructure},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {635--639},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541857},
  doi       = {10.1109/WCINS.2010.5541857},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/KunzWS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LarafaL10,
  author    = {Sondes Larafa and
               Maryline Laurent},
  title     = {Authentication protocol runtime evaluation in distributed {AAA} framework
               for Mobile Ad-Hoc Networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {277--281},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541783},
  doi       = {10.1109/WCINS.2010.5541783},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LarafaL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LariJSIM10,
  author    = {M. H. Yazdanpanah Lari and
               Mohammad Jafari and
               Maryam Salehi and
               Mohsen Imanieh and
               Zahra Malekjamshidi},
  title     = {Simulation and implementation of a fuzzy controlled charger for Ni-Cd
               batteries},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {653--658},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544664},
  doi       = {10.1109/WCINS.2010.5544664},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LariJSIM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LeC10,
  author    = {Deguang Le and
               Jinyi Chang},
  title     = {Tunnelling-based route optimization for Mobile IPv6},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {509--513},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544140},
  doi       = {10.1109/WCINS.2010.5544140},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LeC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LeeL10,
  author    = {Cheng{-}Ta Lee and
               Frank Yeong{-}Sung Lin},
  title     = {Boundary monitoring algorithms for wireless sensor networks of grouping
               capabilities},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {461--467},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544130},
  doi       = {10.1109/WCINS.2010.5544130},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LeeL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LeeSZ10,
  author    = {Myoung{-}Hoon Lee and
               Vincent So and
               Jiying Zhao},
  title     = {A key-code watermarking algorithm for video content protection},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {702--706},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541870},
  doi       = {10.1109/WCINS.2010.5541870},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LeeSZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LengW10,
  author    = {Wen Leng and
               Anguo Wang},
  title     = {Increase channel capacity in {MIMO} system by adjusting the axial
               ratio of circular polarized antenna},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {128--131},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541904},
  doi       = {10.1109/WCINS.2010.5541904},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LengW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiC10,
  author    = {Ying Li and
               Lu{-}Sheng Chen},
  title     = {Multi-conditional e-Cash with transferability},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {381--385},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541804},
  doi       = {10.1109/WCINS.2010.5541804},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiCC10,
  author    = {Weiguang Li and
               HuaMin Chen and
               Ming Chen},
  title     = {Performance analysis for multiuser dual-hop decode-and-forward cooperative
               system over Nakagami-m fading channels},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {41--44},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541770},
  doi       = {10.1109/WCINS.2010.5541770},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiCC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiDYW10,
  author    = {Jilong Li and
               Na Di and
               Ming Yang and
               Zhiyong Wu},
  title     = {Construction of quasi cyclic {LDPC} with {ACE} constraint},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {90--93},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541895},
  doi       = {10.1109/WCINS.2010.5541895},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiDYW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiF10,
  author    = {Lili Li and
               Xiangzhong Fang},
  title     = {New detection scheme for spread spectrum audio watermarking},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {330--334},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541794},
  doi       = {10.1109/WCINS.2010.5541794},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiF10a,
  author    = {Lili Li and
               Xiangzhong Fang},
  title     = {Adaptive detection for spread spectrum audio watermarking},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {58--62},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541888},
  doi       = {10.1109/WCINS.2010.5541888},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiF10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiJ10,
  author    = {Shibao Li and
               Wei Jia},
  title     = {{AODV} route protocol research based on improved {ERS} algorithm},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {102--106},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541755},
  doi       = {10.1109/WCINS.2010.5541755},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiJWGL10,
  author    = {Shanshan Li and
               Jinguang Jiang and
               Jiake Wang and
               Xu Gong and
               Qingyun Li},
  title     = {A new current-mode active-only universal filter using CCCIIs},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {252--255},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541931},
  doi       = {10.1109/WCINS.2010.5541931},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiJWGL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiLZ10,
  author    = {Hongyan Li and
               Yang Liu and
               Dexian Zhang},
  title     = {Dynamic spectrum access for cognitive radio systems with repeated
               games},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {59--62},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541766},
  doi       = {10.1109/WCINS.2010.5541766},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiLZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiZL10,
  author    = {Du{-}juan Li and
               Jian{-}dong Zhang and
               Bin Liu},
  title     = {Periodic message-based modeling and performance analysis of {AFDX}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {162--166},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541912},
  doi       = {10.1109/WCINS.2010.5541912},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiZL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiangLL10,
  author    = {Chiu{-}Kuo Liang and
               Chih{-}Hsuan Lee and
               Jian{-}Da Lin},
  title     = {Steiner trees grid routing protocol in wireless sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {473--477},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544132},
  doi       = {10.1109/WCINS.2010.5544132},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiangLL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiangYL10,
  author    = {Yanxia Liang and
               Jiawei Yang and
               Ye Li},
  title     = {A Multimode Multi-Band Excitation with Linear Prediction vocoder},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {256--259},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541932},
  doi       = {10.1109/WCINS.2010.5541932},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiangYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LinLH10,
  author    = {Frank Yeong{-}Sung Lin and
               Cheng{-}Ta Lee and
               Yen{-}Yi Hsu},
  title     = {An energy-efficient algorithm for object tracking in Wireless Sensor
               Networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {424--430},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544123},
  doi       = {10.1109/WCINS.2010.5544123},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LinLH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LinLL10,
  author    = {Frank Yeong{-}Sung Lin and
               Cheng{-}Ta Lee and
               Li{-}Yi Lin},
  title     = {An efficient time slot allocation algorithm in wireless networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {322--328},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542311},
  doi       = {10.1109/WCINS.2010.5542311},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LinLL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LingBZJ10,
  author    = {Ling Chen and
               Bing Wu and
               Zhiwei Hu and
               Jiahong Liang},
  title     = {Characterizing protocol interaction using metamodeling methodology},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {441--445},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544126},
  doi       = {10.1109/WCINS.2010.5544126},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LingBZJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuC10,
  author    = {Lihua Liu and
               Zhengjun Cao},
  title     = {Improvement of one escrow-free identity-based signature},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {602--606},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541850},
  doi       = {10.1109/WCINS.2010.5541850},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuGLY10,
  author    = {Jin{-}ye Liu and
               Lize Gu and
               Shoushan Luo and
               Yixian Yang},
  title     = {An anonymous authentication scheme for mobile communication},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {359--364},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541800},
  doi       = {10.1109/WCINS.2010.5541800},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuGLY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuHXP10,
  author    = {Lixia Liu and
               Gang Hu and
               Ming Xu and
               Yuxing Peng},
  title     = {Learning Automata based spectrum allocation in cognitive networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {503--508},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544139},
  doi       = {10.1109/WCINS.2010.5544139},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuHXP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuL10,
  author    = {Xugang Liu and
               Hao Liu},
  title     = {A novel half-overlap {FMT} system using {CIC} filter in cognitive
               radio},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {188--192},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541735},
  doi       = {10.1109/WCINS.2010.5541735},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuLL10,
  author    = {Xiaojun Liu and
               Congfeng Liu and
               Guisheng Liao},
  title     = {Improved pattern synthesis method with linearly constraint minimum
               variance criterion},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {63--66},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541889},
  doi       = {10.1109/WCINS.2010.5541889},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuLL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuSGW10,
  author    = {Yejun Liu and
               Qingyang Song and
               Lei Guo and
               Xingwei Wang},
  title     = {A novel QoS-oriented packet scheduling algorithm for mixed services
               in the downlink of {OFMDA} system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {397--402},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543747},
  doi       = {10.1109/WCINS.2010.5543747},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuSGW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuTWY10,
  author    = {Jiandong Liu and
               Ye Tian and
               Shuhong Wang and
               Kai Yang},
  title     = {A fast new one-way cryptographic hash function},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {302--306},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541788},
  doi       = {10.1109/WCINS.2010.5541788},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuTWY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuWCW10,
  author    = {Chien{-}Ting Liu and
               Te{-}Chih Wang and
               Ray{-}I Chang and
               Chia{-}Hui Wang},
  title     = {Cross-layer handoff via predictive multiple pre-registrations for
               QoS of mobile multimedia applications},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {608--612},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542329},
  doi       = {10.1109/WCINS.2010.5542329},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuWCW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuZ10,
  author    = {Gao{-}ping Liu and
               Zi{-}han Zheng},
  title     = {Self-adaptive algorithm for image transmission based on narrow and
               variable bandwidth},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {33--36},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541773},
  doi       = {10.1109/WCINS.2010.5541773},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuZA10,
  author    = {Qiuyan Liu and
               Zhangdui Zhong and
               Bo Ai},
  title     = {A unified approach to the unilateral bounds of interference performance},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {45--49},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541883},
  doi       = {10.1109/WCINS.2010.5541883},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LiuZA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LuZ10,
  author    = {Songtao Lu and
               Yun Zhao},
  title     = {A multipath mitigation algorithm in Global Navigation Satellite Systems
               arrays using Independent Component Analysis},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {28--32},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544048},
  doi       = {10.1109/WCINS.2010.5544048},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LuZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LuZN10,
  author    = {Wenhui Lu and
               Zheying Zhang and
               Jyrki Nummenmaa},
  title     = {A generic data model with a decomposition operation for {DRM} interoperability},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {630--634},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541856},
  doi       = {10.1109/WCINS.2010.5541856},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LuZN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LuoCHC10,
  author    = {Qiao Luo and
               Jing Chen and
               Chonghui Huang and
               Guirong Chen},
  title     = {Study of {MANET} routing evaluation model based on Best-First},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {329--332},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542312},
  doi       = {10.1109/WCINS.2010.5542312},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LuoCHC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LuoZ10,
  author    = {Zhenyi Luo and
               Jiying Zhao},
  title     = {Wideband audio over narrowband based on digital watermarking},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {697--701},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541869},
  doi       = {10.1109/WCINS.2010.5541869},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/LuoZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MaFB10,
  author    = {Xiaofu Ma and
               Yu Fang and
               Xingzhen Bai},
  title     = {A balanced energy consumption clustering algorithm for heterogeneous
               energy wireless sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {382--386},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543726},
  doi       = {10.1109/WCINS.2010.5543726},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MaFB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MaHYS10,
  author    = {Shichuan Ma and
               Michael Hempel and
               Yaoqing Yang and
               Hamid Sharif},
  title     = {A new approach to null space-based noise signal generation for secure
               wireless communications in transmit-receive diversity systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {406--410},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541809},
  doi       = {10.1109/WCINS.2010.5541809},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MaHYS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MaLG10,
  author    = {Lan Ma and
               Gang Li and
               Wei Gao},
  title     = {State observer based adaptive information assurance evaluation model},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {173--178},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541914},
  doi       = {10.1109/WCINS.2010.5541914},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MaLG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MaYJ10,
  author    = {Lan Ma and
               Hanming Yan and
               Zonghui Jin},
  title     = {The secure approach of accessing to the kernel database in state key
               information system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {167--172},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541913},
  doi       = {10.1109/WCINS.2010.5541913},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MaYJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MaZW10,
  author    = {Zemin Ma and
               Jinhe Zhou and
               Tonghai Wu},
  title     = {A cross-layer QoS scheme for {MPEG-4} streams},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {392--396},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543738},
  doi       = {10.1109/WCINS.2010.5543738},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MaZW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MathewD10,
  author    = {George Mathew and
               Xiaojiang Du},
  title     = {Securing multi-tiered web applications},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {505--509},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541830},
  doi       = {10.1109/WCINS.2010.5541830},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MathewD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MeiSZ10,
  author    = {Lin Mei and
               Xuejun Sha and
               Naitong Zhang},
  title     = {Covert communication based on waveform overlay with Weighted Fractional
               Fourier Transform signals},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {472--475},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541823},
  doi       = {10.1109/WCINS.2010.5541823},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MeiSZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MendesB10,
  author    = {Lucas Dias Palhao Mendes and
               Jose Marcos Camara Brito},
  title     = {Effects of the use of an {IEEE} 802.11 Snoop Agent on {TCP} timeouts},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {493--497},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544138},
  doi       = {10.1109/WCINS.2010.5544138},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MendesB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MoghaddamBD10,
  author    = {Mohammad Dosaranian Moghaddam and
               Hamidreza Bakhshi and
               Gholamreza Dadashzadeh},
  title     = {Interference management for {DS-CDMA} receiver through base station
               assignment in multipath fading channels},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {257--263},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541721},
  doi       = {10.1109/WCINS.2010.5541721},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MoghaddamBD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/MuL10,
  author    = {Jiasong Mu and
               Kaihua Liu},
  title     = {A Routing strategy based on node movement in ZigBee networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {583--587},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543928},
  doi       = {10.1109/WCINS.2010.5543928},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/MuL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/NarayanSLV10,
  author    = {Shaneel Narayan and
               Shailendra S. Sodhi and
               Paula Raymond Lutui and
               Kaushik J. Vijayakumar},
  title     = {Network performance evaluation of routers in IPv4/IPv6 environment},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {707--710},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541871},
  doi       = {10.1109/WCINS.2010.5541871},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/NarayanSLV10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/NedelcuTSMS10,
  author    = {Adrian{-}Valentin Nedelcu and
               Doru Talaba and
               Vlad Cristian Stoianovici and
               Mihai Machedon{-}Pisu and
               Iuliu Sz{\'{e}}kely},
  title     = {Conceptual integration of wireless sensor networks with 3D virtual
               environments},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {446--450},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544127},
  doi       = {10.1109/WCINS.2010.5544127},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/NedelcuTSMS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/OhoussouJZZXC10,
  author    = {Alex K. Ohoussou and
               Hai Jin and
               Deqing Zou and
               Feng Zhao and
               Guofu Xiang and
               Ge Cheng},
  title     = {Autonomous agent based intrusion detection in virtual computing environment},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {682--686},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541866},
  doi       = {10.1109/WCINS.2010.5541866},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/OhoussouJZZXC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/PatelAK10,
  author    = {Keyurkumar J. Patel and
               S. Vijay Anand and
               S. P. Suman Kumar},
  title     = {A robust QoS framework on Android for effective media delivery to
               {DLNA} Enabled Home gateway in smart home environment},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {217--222},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541729},
  doi       = {10.1109/WCINS.2010.5541729},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/PatelAK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/PiaoFYH10,
  author    = {Chunhui Piao and
               Zhenjiang Fan and
               Chunyan Yang and
               Xufang Han},
  title     = {Research on {RFID} security protocol based on grouped tags and re-encryption
               scheme},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {568--572},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541843},
  doi       = {10.1109/WCINS.2010.5541843},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/PiaoFYH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Pinchas10,
  author    = {Monika Pinchas},
  title     = {A new closed approximated formed expression for the achievable residual
               {ISI} obtained by adaptive blind equalizers for the noisy case},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {26--30},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541879},
  doi       = {10.1109/WCINS.2010.5541879},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Pinchas10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/QiuXHJ10,
  author    = {PengYu Qiu and
               Dan Xu and
               Zhi{-}Tao Huang and
               Wenli Jiang},
  title     = {Blind spreading sequence set estimation of the M-ary direct sequence
               spread spectrum signals},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {188--191},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541917},
  doi       = {10.1109/WCINS.2010.5541917},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/QiuXHJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Quadeer10,
  author    = {Ahmed Abdul Quadeer},
  title     = {Enhanced equalization in {OFDM} systems using cyclic prefix},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {40--44},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541882},
  doi       = {10.1109/WCINS.2010.5541882},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Quadeer10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/RaazaM10,
  author    = {Arun Raaza and
               Amit Mehta},
  title     = {Multiple beams scanning double square loop antenna for {UWB} communications},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {320--324},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541792},
  doi       = {10.1109/WCINS.2010.5541792},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/RaazaM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/RafieeK10,
  author    = {M. Saadeq Rafieee and
               Ali Akbar Khazaei},
  title     = {A novel model characteristics for noise-robust Automatic Speech Recognition
               based on {HMM}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {215--218},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541923},
  doi       = {10.1109/WCINS.2010.5541923},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/RafieeK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/RahimiS10,
  author    = {Mohammad Rahimi and
               Reza Safabakhsh},
  title     = {Adaptation of sampling in target tracking sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {301--305},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541942},
  doi       = {10.1109/WCINS.2010.5541942},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/RahimiS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/RathnayakePOS10,
  author    = {Upendra Rathnayake and
               Henrik Petander and
               Maximilian Ott and
               Aruna Seneviratne},
  title     = {Protocol support for bulk transfer architecture},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {598--602},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5545343},
  doi       = {10.1109/WCINS.2010.5545343},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/RathnayakePOS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Ren10,
  author    = {Junling Ren},
  title     = {Information hiding algorithm for palette images based on {HVS}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {354--358},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541799},
  doi       = {10.1109/WCINS.2010.5541799},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Ren10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/RuzhiLj10,
  author    = {Ruzhi Xu and
               Liwu Deng and
               Jian Guo},
  title     = {A learning-based anomaly detection model of {SQL} attacks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {639--642},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544650},
  doi       = {10.1109/WCINS.2010.5544650},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/RuzhiLj10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SamadAKYA10,
  author    = {Hairol Azaha Abdul Samad and
               Mohd Faruzi Shaiful Azni and
               Mohd Fikry Abdul Karim and
               Mazlaini Yahya and
               Mohd Arif Arifen},
  title     = {Rapid modeling, characterization, optimization methodology and analysis
               for low cost {RF} filter design},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {264--268},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541722},
  doi       = {10.1109/WCINS.2010.5541722},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SamadAKYA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SavithaK10,
  author    = {H. M. Savitha and
               Muralidhar Kulkarni},
  title     = {Performance comparison of hard and soft-decision turbo coded {OFDM}
               systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {551--555},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544146},
  doi       = {10.1109/WCINS.2010.5544146},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SavithaK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SchlegelW10,
  author    = {Roman Schlegel and
               Duncan S. Wong},
  title     = {An efficient routing protocol for anonymous networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {349--353},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541798},
  doi       = {10.1109/WCINS.2010.5541798},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SchlegelW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SchriddeDJFS10,
  author    = {Christian Schridde and
               Tim D{\"{o}}rnemann and
               Ernst Juhnke and
               Bernd Freisleben and
               Matthew Smith},
  title     = {An identity-based security infrastructure for Cloud environments},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {644--649},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541859},
  doi       = {10.1109/WCINS.2010.5541859},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SchriddeDJFS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShafighAK10,
  author    = {Alireza shams Shafigh and
               Kamran Abdollahi and
               Andreas J. Kassler},
  title     = {Improving performance of on demand multicast routing by using fuzzy
               logic},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {525--529},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544141},
  doi       = {10.1109/WCINS.2010.5544141},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShafighAK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShakeriH10,
  author    = {Majid Shakeri and
               Ebrahim Hosseini},
  title     = {Simulation and evaluation of routing protocols in wireless mobile
               Ad Hoc network},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {603--607},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5545215},
  doi       = {10.1109/WCINS.2010.5545215},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShakeriH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShanSPGZ10,
  author    = {Hongying Shan and
               Lili Su and
               Songyan Pan and
               Shubin Ge and
               Libin Zhang},
  title     = {Simulation analysis of error correction method of headlamp detection
               based on driving direction},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {290--294},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541940},
  doi       = {10.1109/WCINS.2010.5541940},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShanSPGZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShenWZ10,
  author    = {Zhi{-}Dong Shen and
               Xiaoping Wu and
               Jing Zhan},
  title     = {Trust management for mobile agent system based on trusted computing
               platforms},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {717--721},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541873},
  doi       = {10.1109/WCINS.2010.5541873},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShenWZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShiK10,
  author    = {Qinghua Shi and
               Yoshio Karasawa},
  title     = {{OFDM} symbol detection based on frequency-domain oversampling},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {160--164},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541741},
  doi       = {10.1109/WCINS.2010.5541741},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShiK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShiX10,
  author    = {Zhicai Shi and
               Yongxiang Xia},
  title     = {A novel hidden Markov model for detecting complicate network attacks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {312--315},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541790},
  doi       = {10.1109/WCINS.2010.5541790},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShiX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ShuC10,
  author    = {Zhihui Shu and
               Wen Chen},
  title     = {Optimal power allocation in cognitive relay networks under different
               power constraints},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {647--652},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544631},
  doi       = {10.1109/WCINS.2010.5544631},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ShuC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Song10,
  author    = {Lizhong Song},
  title     = {Performance simulation of a kind of conformal sinuous antenna with
               four arms},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {169--172},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541739},
  doi       = {10.1109/WCINS.2010.5541739},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Song10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Song10a,
  author    = {Lizhong Song},
  title     = {Simulation and analysis of a spherical conformal Archimedean spiral
               antenna},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {173--177},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541740},
  doi       = {10.1109/WCINS.2010.5541740},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Song10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SongHW10,
  author    = {Jie Song and
               Jianhao Hu and
               Zhao Wang},
  title     = {Evolutionary Game Algorithm for channel estimation in Interleave-Division
               Multiple Access Systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {92--97},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541757},
  doi       = {10.1109/WCINS.2010.5541757},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SongHW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SongXZ10,
  author    = {Chunyun Song and
               Jianmin Xu and
               Yi Zhan},
  title     = {A method for specific emitter identification based on empirical mode
               decomposition},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {54--57},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541885},
  doi       = {10.1109/WCINS.2010.5541885},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SongXZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Su10,
  author    = {Xin Su},
  title     = {A comparative survey of routing protocol for vehicular sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {311--316},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542309},
  doi       = {10.1109/WCINS.2010.5542309},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Su10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SuA10,
  author    = {Ying Su and
               Latif Al{-}Hakim},
  title     = {Assuring information quality in medical platform for U-Healthcare
               service},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {664--668},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544670},
  doi       = {10.1109/WCINS.2010.5544670},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SuA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SuN10,
  author    = {Xiaoqiang Su and
               Hong Ni},
  title     = {A {HPMM} method for increasing mobile downloading speed},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {377--381},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543722},
  doi       = {10.1109/WCINS.2010.5543722},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SuN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SuWX10,
  author    = {Yanyong Su and
               Huaming Wu and
               Yuanyuan Xu},
  title     = {Reducing {PAPR} based on constellation mapping {\&} fast algorithm},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {206--210},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541921},
  doi       = {10.1109/WCINS.2010.5541921},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SuWX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SubramanianLLP10,
  author    = {Deepak Subramanian and
               Ha{-}Thanh Le and
               Peter Kok Keong Loh and
               Annamalai Benjamin Premkumar},
  title     = {An empirical vulnerability remediation model},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {376--380},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541803},
  doi       = {10.1109/WCINS.2010.5541803},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SubramanianLLP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunB10,
  author    = {Xinde Sun and
               Shukui Bo},
  title     = {A blind digital watermarking for color medical images based on {PCA}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {421--427},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541812},
  doi       = {10.1109/WCINS.2010.5541812},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunCX10,
  author    = {Youwei Sun and
               Rong Chen and
               Guangning Xu},
  title     = {The constitution of the transmission network for the next generation
               cable digital {TV} signals},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {229--233},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541926},
  doi       = {10.1109/WCINS.2010.5541926},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunCX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunTY10,
  author    = {Yanliang Sun and
               Ricai Tian and
               Qiyue Yu},
  title     = {Frequency domain equalization with user interference cancellation
               for 2-dimensional block spread {CDMA} system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {242--246},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541726},
  doi       = {10.1109/WCINS.2010.5541726},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunTY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunY10,
  author    = {Guolin Sun and
               Feng Ye},
  title     = {A FFT-window search algorithm for diversity combining in downlink
               multipoint joint transmission},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {63--67},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541763},
  doi       = {10.1109/WCINS.2010.5541763},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunYL10,
  author    = {Wanlu Sun and
               Wei Yang and
               Lihua Li},
  title     = {A simple channel estimation method in {MIMO-OFDM} systems with virtual
               subcarriers},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {35--39},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541881},
  doi       = {10.1109/WCINS.2010.5541881},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunZ10,
  author    = {Jun{-}Zhao Sun and
               Jiehan Zhou},
  title     = {Querying sensor networks with extended {SQL}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {634--638},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544647},
  doi       = {10.1109/WCINS.2010.5544647},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SunZ10a,
  author    = {Jingdong Sun and
               Yibin Zhang},
  title     = {Railway passenger dynamic E-business based on Web services and {RFID}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {577--581},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541845},
  doi       = {10.1109/WCINS.2010.5541845},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SunZ10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SungSS10,
  author    = {Kiwoon Sung and
               Suman Srinivasan and
               Henning Schulzrinne},
  title     = {{BBS-ONE:} Bulletin board and forum system for mobile opportunistic
               networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {370--375},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541802},
  doi       = {10.1109/WCINS.2010.5541802},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SungSS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/SungSS10a,
  author    = {Kiwoon Sung and
               Suman Srinivasan and
               Henning Schulzrinne},
  title     = {{BBS-ONE:} Bulletin board and forum system for mobile opportunistic
               networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {371--376},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543719},
  doi       = {10.1109/WCINS.2010.5543719},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/SungSS10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TangC10,
  author    = {Hongying Tang and
               Wen Chen},
  title     = {Diversity-multiplexing tradeoff analysis for wireless multicast systems
               with Amplify-and-Forward scheme},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {295--300},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541941},
  doi       = {10.1109/WCINS.2010.5541941},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TangC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TangNWWT10,
  author    = {Xiaonian Tang and
               Guijun Nian and
               Quan Wen and
               Jianchun Wang and
               Xiaoyan Tang},
  title     = {Robust watermarking in multiwavelet domain based on average subimage
               of low frequency},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {460--464},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541821},
  doi       = {10.1109/WCINS.2010.5541821},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TangNWWT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TangWC10,
  author    = {Lun Tang and
               Huan Wang and
               Qianbin Chen},
  title     = {Power allocation with min-max fairness for cognitive radio networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {478--482},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544133},
  doi       = {10.1109/WCINS.2010.5544133},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TangWC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TangWZ10,
  author    = {Yi Tang and
               Yuanyuan Wu and
               Quan Zhou},
  title     = {{AASC:} Anonymizing network addresses based on subnet clustering},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {672--676},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541864},
  doi       = {10.1109/WCINS.2010.5541864},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TangWZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TaspinarS10,
  author    = {Necmi Taspinar and
               Muhammet Nuri Seyman},
  title     = {Back propagation neural network approach for channel estimation in
               {OFDM} system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {265--268},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541934},
  doi       = {10.1109/WCINS.2010.5541934},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TaspinarS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TeoOI10,
  author    = {Kok Ann Donny Teo and
               Shuichi Ohno and
               Takanori Ishii},
  title     = {Turbo equalization and channel re-estimation in {OFDM} over doubly-selective
               channel},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {137--141},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541906},
  doi       = {10.1109/WCINS.2010.5541906},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TeoOI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TianL10,
  author    = {Liqin Tian and
               Chuang Lin},
  title     = {Computation and analysis of node intending trust in WSNs},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {496--499},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541828},
  doi       = {10.1109/WCINS.2010.5541828},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TianL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TommasiMSM10,
  author    = {Franco Tommasi and
               Simone Molendini and
               Elena Scialpi and
               Catiuscia Melle},
  title     = {{CHARMS:} Cooperative hybrid architecture for relaying multicast satellite
               streams to sites without a satellite receiver},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {269--276},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541782},
  doi       = {10.1109/WCINS.2010.5541782},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TommasiMSM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/TongZSW10,
  author    = {Xiaojun Tong and
               Zhangquan Zhao and
               Huimin Shuai and
               Zhu Wang},
  title     = {The research of worm distributed detection technology based on network
               security},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {416--420},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541811},
  doi       = {10.1109/WCINS.2010.5541811},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/TongZSW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Vishnu10,
  author    = {K. Vishnu},
  title     = {A new kind of transport layer attack in wireless Ad Hoc Networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {198--201},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541733},
  doi       = {10.1109/WCINS.2010.5541733},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Vishnu10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WanLF10,
  author    = {Xiao{-}Yu Wan and
               Zhang Li and
               Zi{-}fu Fan},
  title     = {A {SIP} DoS flooding attack defense mechanism based on priority class
               queue},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {428--431},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541813},
  doi       = {10.1109/WCINS.2010.5541813},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WanLF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WanYLZ10,
  author    = {Ming Wan and
               Nan Yao and
               Ying Liu and
               Hongke Zhang},
  title     = {A fast information reproduction method for {HTTP} in {WLAN}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {365--369},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541801},
  doi       = {10.1109/WCINS.2010.5541801},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WanYLZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Wang10,
  author    = {Zhen{-}Wu Wang},
  title     = {A generic access control model based on ontology},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {335--339},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541795},
  doi       = {10.1109/WCINS.2010.5541795},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Wang10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Wang10a,
  author    = {Ling{-}ling Wang},
  title     = {Multi-party concurrent signatures based on short ring signatures},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {515--517},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541832},
  doi       = {10.1109/WCINS.2010.5541832},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Wang10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Wang10b,
  author    = {Hui{-}bin Wang},
  title     = {A new model of formal design system of security authentication protocol},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {549--552},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541839},
  doi       = {10.1109/WCINS.2010.5541839},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Wang10b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangCY10,
  author    = {Xun Wang and
               Qing{-}Feng Chen and
               Bailin Yang},
  title     = {Simulation of adaptive {FEC} mechanism for streaming 3D models over
               wireless networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {519--524},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541887},
  doi       = {10.1109/WCINS.2010.5541887},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangCY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangGGT10,
  author    = {Gongpu Wang and
               Feifei Gao and
               Xuerong Gou and
               Chintha Tellambura},
  title     = {Effects of channel estimation errors on {BPSK} systems using superimposed
               pilots},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {165--168},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541742},
  doi       = {10.1109/WCINS.2010.5541742},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangGGT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangHYW10,
  author    = {Bo Wang and
               Chuanhe Huang and
               Wenzhong Yang and
               Tong Wang},
  title     = {Trust opportunistic routing protocol in multi-hop wireless networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {563--567},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541842},
  doi       = {10.1109/WCINS.2010.5541842},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangHYW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangJLGL10,
  author    = {Jiake Wang and
               Jinguang Jiang and
               Shanshan Li and
               Xu Gong and
               Qingyun Li},
  title     = {A high stability low drop-out regulator with fast transient response},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {561--565},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544149},
  doi       = {10.1109/WCINS.2010.5544149},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangJLGL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangL10,
  author    = {Mu{-}Liang Wang and
               Mn{-}Ta Lee},
  title     = {A neural network based coding mode selection scheme of hybrid audio
               coder},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {107--110},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541899},
  doi       = {10.1109/WCINS.2010.5541899},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangSFW10,
  author    = {Shiqiang Wang and
               Qingyang Song and
               Jianxin Feng and
               Xingwei Wang},
  title     = {Predicting the link stability based on link connectivity changes in
               mobile ad hoc networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {409--414},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544120},
  doi       = {10.1109/WCINS.2010.5544120},
  timestamp = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangSFW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangSHG10,
  author    = {Jimei Wang and
               Guochu Shou and
               Yihong Hu and
               Zhigang Guo},
  title     = {High-speed architectures for {GHASH} based on efficient bit-parallel
               multipliers},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {582--586},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541846},
  doi       = {10.1109/WCINS.2010.5541846},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangSHG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangTQ10,
  author    = {Hao Wang and
               Zuohua Tian and
               Chenye Qiu},
  title     = {{RSP:} Robust smith predictor for queue management in time-delay networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {623--627},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5545146},
  doi       = {10.1109/WCINS.2010.5545146},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangTQ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangWD10,
  author    = {Chunlei Wang and
               Yan Wen and
               Yiqi Dai},
  title     = {A software vulnerability analysis environment based on virtualization
               technology},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {620--624},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541854},
  doi       = {10.1109/WCINS.2010.5541854},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangWD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangWH10,
  author    = {Yuan Wang and
               Duncan S. Wong and
               Liusheng Huang},
  title     = {One-pass key establishment for anonymous wireless roaming},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {533--537},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541836},
  doi       = {10.1109/WCINS.2010.5541836},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangWH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangWY10,
  author    = {Zhuo Wang and
               Lizhi Wang and
               Yong Yang},
  title     = {Remove multifrequency mixture noise in processing of Wireless Communication
               wave/radar reflect signal by method of {ICA}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {50--53},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541884},
  doi       = {10.1109/WCINS.2010.5541884},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangWY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangWYG10,
  author    = {Zhongxun Wang and
               Xingcheng Wang and
               Xinqiao Yu and
               Dong Guo},
  title     = {A {BP} decoding algorithm based on nodes residual for {LDPC} codes},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {124--127},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541903},
  doi       = {10.1109/WCINS.2010.5541903},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangWYG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangX10,
  author    = {Qiongqiong Wang and
               Mingjun Xin},
  title     = {Research on a secure mobile payment based on multi-agents},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {663--666},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541862},
  doi       = {10.1109/WCINS.2010.5541862},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangXLW10,
  author    = {Gengkun Wang and
               Wei Xiang and
               John Leis and
               Yafeng Wang},
  title     = {Design of a wireless portable vibration acquisition and analysis instrument},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {135--139},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541747},
  doi       = {10.1109/WCINS.2010.5541747},
  timestamp = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangXLW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangXSC10,
  author    = {Ming{-}Qiu Wang and
               Shu{-}Tao Xia and
               He{-}Guang Su and
               Lai{-}Zhong Cui},
  title     = {A quantization schema with negligible degradation for {LDPC} decoder},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {243--247},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541929},
  doi       = {10.1109/WCINS.2010.5541929},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangXSC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangYWG10,
  author    = {Zhongxun Wang and
               Xinqiao Yu and
               Xingcheng Wang and
               Dong Guo},
  title     = {An improved {IWBF} decoding algorithm based on {LDPC} codes in the
               image transmission},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {98--101},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541758},
  doi       = {10.1109/WCINS.2010.5541758},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangYWG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangZ10,
  author    = {Jianfeng Wang and
               Xiaorong Zhao},
  title     = {A new approach for image retrieval with integrated Euclidean distance
               and rotational correlation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {391--395},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541806},
  doi       = {10.1109/WCINS.2010.5541806},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WangZGW10,
  author    = {Fangwei Wang and
               Yunkai Zhang and
               Honggang Guo and
               Changguang Wang},
  title     = {Combating self-learning worms by using predators},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {607--611},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541851},
  doi       = {10.1109/WCINS.2010.5541851},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WangZGW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WeiZWY10,
  author    = {Pengcheng Wei and
               Yingxian Zhu and
               Ran Wei and
               Xinbo Yang},
  title     = {Public-key cryptosystem based on permutation rational function},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {452--454},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541819},
  doi       = {10.1109/WCINS.2010.5541819},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WeiZWY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WenZhongCBZT10,
  author    = {Wenzhong Yang and
               Chuanhe Huang and
               Bo Wang and
               Zhenyu Zhang and
               Tong Wang},
  title     = {A reliable multicast for MANETs based on opportunistic routing and
               network coding},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {540--545},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544144},
  doi       = {10.1109/WCINS.2010.5544144},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WenZhongCBZT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WuDK10,
  author    = {Haijie Wu and
               Yanwu Ding and
               Hyuck M. Kwon},
  title     = {Phase synchronization for distributed sensor networks in feedback
               bit errors},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {282--286},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541784},
  doi       = {10.1109/WCINS.2010.5541784},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WuDK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WuLCL10,
  author    = {Hsien{-}Tsai Wu and
               Chun{-}Ho Lee and
               Chun{-}Erh Chen and
               An{-}Bang Liu},
  title     = {Predicting arterial stiffness with the aid of ensemble empirical mode
               decomposition(EEMD) algorithm},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {179--182},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541915},
  doi       = {10.1109/WCINS.2010.5541915},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WuLCL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/WuLX10,
  author    = {Zhiqiang Wu and
               Bin Li and
               Jiadong Xu},
  title     = {A DSP-based underwater communication modem using electric current
               method},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {78--82},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541762},
  doi       = {10.1109/WCINS.2010.5541762},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/WuLX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XiaW10,
  author    = {Wei{-}wei Xia and
               Hai{-}feng Wang},
  title     = {Prediction model of network security situation based on regression
               analysis},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {616--619},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541853},
  doi       = {10.1109/WCINS.2010.5541853},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XiaW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XiaZG10,
  author    = {Bin Xia and
               Peng Zhang and
               Qin Guo},
  title     = {Linear combination design of wavelet pulses for {UWB} communication
               system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {140--142},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541748},
  doi       = {10.1109/WCINS.2010.5541748},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XiaZG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Xiao-Chun10,
  author    = {Xie Xiao{-}Chun},
  title     = {Compressive sensing based measurement of time-frequency shifts system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {94--97},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541896},
  doi       = {10.1109/WCINS.2010.5541896},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Xiao-Chun10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XiaoWZ10,
  author    = {Binggang Xiao and
               Xiumin Wang and
               Jixiang Zhao},
  title     = {A dual band notched ultra-wideband antenna using complementary split
               ring resonators},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {107--109},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541756},
  doi       = {10.1109/WCINS.2010.5541756},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XiaoWZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XiaoWZ10a,
  author    = {Binggang Xiao and
               Xiumin Wang and
               Jixiang Zhao},
  title     = {A band notched ultra-wideband antenna using complementary split ring
               resonator},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {110--112},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541753},
  doi       = {10.1109/WCINS.2010.5541753},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XiaoWZ10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XiaoWZ10b,
  author    = {Binggang Xiao and
               Xiumin Wang and
               Jixiang Zhao},
  title     = {Ultra-wideband antenna with frequency notch characteristic using a
               complementary split ring resonator},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {113--115},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541754},
  doi       = {10.1109/WCINS.2010.5541754},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XiaoWZ10b.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XieZ10,
  author    = {Wenjian Xie and
               Zhang Zhang},
  title     = {Efficient and provably secure certificateless signcryption from bilinear
               maps},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {558--562},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541841},
  doi       = {10.1109/WCINS.2010.5541841},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XieZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XinYHJ10,
  author    = {Lai Xin and
               Zhu Yi and
               Zhai Hualei and
               Li Jun},
  title     = {Research on position algorithm based on similarity for wireless Ad
               Hoc networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {223--227},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541730},
  doi       = {10.1109/WCINS.2010.5541730},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XinYHJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XingLTW10,
  author    = {Tianyi Xing and
               Yuanan Liu and
               Bihua Tang and
               Fan Wu},
  title     = {Dynamic-Adjusting {AODV} Routing Protocol Based on Max hop count},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {535--539},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544143},
  doi       = {10.1109/WCINS.2010.5544143},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XingLTW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XuGZ10,
  author    = {Xiaodong Xu and
               Xiao Guo and
               Shirui Zhu},
  title     = {A queuing analysis for low-rate DoS attacks against application servers},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {500--504},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541829},
  doi       = {10.1109/WCINS.2010.5541829},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XuGZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XuLXC10,
  author    = {Dechen Xu and
               Zhiwen Liu and
               Yougen Xu and
               Jinliang Cao},
  title     = {A unitary transformation method for {DOA} estimation with uniform
               circular array},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {142--145},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541907},
  doi       = {10.1109/WCINS.2010.5541907},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XuLXC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XuW10,
  author    = {Dehe Xu and
               Qisheng Wang},
  title     = {The study of watermarking algorithm for vector geospatial data based
               on the phase of {DFT}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {625--629},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541855},
  doi       = {10.1109/WCINS.2010.5541855},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XuW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XuWW10,
  author    = {Dawen Xu and
               Rangding Wang and
               Jicheng Wang},
  title     = {Low complexity video watermarking algorithm by exploiting {CAVLC}
               in {H.264/AVC}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {411--415},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541810},
  doi       = {10.1109/WCINS.2010.5541810},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XuWW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XuYG10,
  author    = {Ning Xu and
               Zhen Yang and
               Haiyan Guo},
  title     = {Voice conversion with a strategy for separating speaker individuality
               using state-space model},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {298--301},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541787},
  doi       = {10.1109/WCINS.2010.5541787},
  timestamp = {Tue, 17 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wcnis/XuYG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/XueMC10,
  author    = {Wei Xue and
               Wei{-}qun Ma and
               Bing{-}cai Chen},
  title     = {Research on a realization method of the optimized efficient spectrum
               signals using Legendre series},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {155--159},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541744},
  doi       = {10.1109/WCINS.2010.5541744},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/XueMC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangC10,
  author    = {Shin{-}Jer Yang and
               Sao{-}Uen Chen},
  title     = {QoS-based fast handover scheme for improving service continuity in
               MIPv6},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {403--408},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543765},
  doi       = {10.1109/WCINS.2010.5543765},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangD10,
  author    = {Fan Yang and
               Shenghua Dai},
  title     = {A single-chip solution for railway frequency-shift signal detection},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {197--201},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541919},
  doi       = {10.1109/WCINS.2010.5541919},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangDYLY10,
  author    = {Xiaogang Yang and
               Weitao Du and
               Jingang Yu and
               Rui Lv and
               Zhanxin Yang},
  title     = {A novel 3780-point {FFT}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {178--182},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541737},
  doi       = {10.1109/WCINS.2010.5541737},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangDYLY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangHXL10,
  author    = {Zhen{-}Guo Yang and
               Liusheng Huang and
               Mingjun Xiao and
               Wang Liu},
  title     = {Flow-Based Transmission Scheduling in Delay Tolerant Networks with
               bandwidth constraint},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {451--455},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544128},
  doi       = {10.1109/WCINS.2010.5544128},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangHXL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangL10,
  author    = {Chungang Yang and
               Jiandong Li},
  title     = {Dynamic resource management mechanism design for heterogeneous networks
               under {IEEE1900.4} framework: {A} network utility maximization perspective},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {333--337},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5542313},
  doi       = {10.1109/WCINS.2010.5542313},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangL10a,
  author    = {Jue Yang and
               Xinrong Li},
  title     = {Design and implementation of low-power wireless sensor networks for
               environmental monitoring},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {593--597},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543952},
  doi       = {10.1109/WCINS.2010.5543952},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangL10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangTA10,
  author    = {Li Yang and
               Martin Tomlinson and
               Marcel Ambroze},
  title     = {Decoding low-density parity-check codes with error-floor free over
               the {AWGN} channel},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {192--196},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541918},
  doi       = {10.1109/WCINS.2010.5541918},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangTA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangWCL10,
  author    = {Fan Yang and
               Zhen{-}kai Wang and
               Jianya Chen and
               Yunjie Liu},
  title     = {{VLB-VNE:} {A} regionalized Valiant Load-balancing algorithm in virtual
               network mapping},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {432--436},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541814},
  doi       = {10.1109/WCINS.2010.5541814},
  timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangWCL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YangYLY10,
  author    = {Wenjing Yang and
               Xinyu Yang and
               Guozheng Liu and
               Wei Yu},
  title     = {An Interference Avoidance Multipath Routing protocol based on greedy
               forwarding in MANETs},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {483--487},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544137},
  doi       = {10.1109/WCINS.2010.5544137},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YangYLY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YaoCWH10,
  author    = {Chunjiang Yao and
               Xiaohu Chen and
               Xuping Wang and
               Qingfei He},
  title     = {Design and implementation of signal acquisition system based on wireless
               transmission},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {121--125},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541752},
  doi       = {10.1109/WCINS.2010.5541752},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YaoCWH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YaoFL10,
  author    = {Yue Yao and
               Yong Fan and
               Haiyan Luo},
  title     = {A distributed relay node placement strategy based on balanced network
               lifetime for wireless sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {306--310},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541943},
  doi       = {10.1109/WCINS.2010.5541943},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YaoFL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YiF10,
  author    = {Zhang Yi and
               Yao Fu{-}qiang},
  title     = {Optimal noncoherent frequency detection of differential frequency
               hopping signal},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {146--149},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541908},
  doi       = {10.1109/WCINS.2010.5541908},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YiF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YiLD10,
  author    = {Xiao Yi and
               Yu Liu and
               Lu Deng},
  title     = {A novel environment self-adaptive localization algorithm based on
               {RSSI} for wireless sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {360--363},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544136},
  doi       = {10.1109/WCINS.2010.5544136},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YiLD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YinMZYW10,
  author    = {Caihua Yin and
               Dawei Ma and
               Yu Zheng and
               Gang Yu and
               Jian Wang},
  title     = {Channel estimation and symbol demodulation of the transform domain
               communication system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {233--236},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541728},
  doi       = {10.1109/WCINS.2010.5541728},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YinMZYW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YinZMYW10,
  author    = {Caihua Yin and
               Yu Zheng and
               Dawei Ma and
               Gang Yu and
               Jian Wang},
  title     = {Detection of the CDMA-based transform domain communication system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {193--197},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541736},
  doi       = {10.1109/WCINS.2010.5541736},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YinZMYW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuCL10,
  author    = {Miao Yu and
               Jianzhong Chen and
               Shiju Li},
  title     = {Average filtered blind separation of {DS-CDMA} signals with {ICA}
               method},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {234--237},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541927},
  doi       = {10.1109/WCINS.2010.5541927},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuCL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuLC10,
  author    = {Miao Yu and
               Shiju Li and
               Jianzhong Chen},
  title     = {Convergence characteristics analysis on blind separation of {DS-CDMA}
               signals with {ICA} method},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {238--242},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541928},
  doi       = {10.1109/WCINS.2010.5541928},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuLC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuSY10,
  author    = {Xinle Yu and
               Dandan Song and
               Zhanxin Yang},
  title     = {The performance of multilevel coded 64DAPSK modulated {OFDM} system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {18--22},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544049},
  doi       = {10.1109/WCINS.2010.5544049},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuSY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuWLYZZ10,
  author    = {Jian Yu and
               Jianrong Wang and
               Xiao Liu and
               Mei Yu and
               Zheng Zhao and
               Yan Zhang},
  title     = {Community-based trust mechanism in {P2P} social networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {669--673},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544673},
  doi       = {10.1109/WCINS.2010.5544673},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuWLYZZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuWWLZZ10,
  author    = {Mei Yu and
               Jianrong Wang and
               Qingjie Wang and
               Xuan Liu and
               Zheng Zhao and
               Yan Zhang},
  title     = {Semantic-based query routing in {P2P} social networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {674--678},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544676},
  doi       = {10.1109/WCINS.2010.5544676},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuWWLZZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuZW10,
  author    = {Sheng Yu and
               Shijie Zhou and
               Sha Wang},
  title     = {Fast-flux attack network identification based on agent lifespan},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {658--662},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541861},
  doi       = {10.1109/WCINS.2010.5541861},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuZW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Yuan10,
  author    = {Xue Yuan},
  title     = {Biometric verification using hand vein-patterns},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {677--681},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541865},
  doi       = {10.1109/WCINS.2010.5541865},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Yuan10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuanDZ10,
  author    = {Jingbo Yuan and
               Shunli Ding and
               Dan Zhang},
  title     = {An energy-balancing routing protocol based on {AODV}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {588--592},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5543948},
  doi       = {10.1109/WCINS.2010.5543948},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuanDZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuanZHZF10,
  author    = {Runping Yuan and
               Taiyi Zhang and
               Jianxiong Huang and
               Jing Zhang and
               Zhenjie Feng},
  title     = {Performance analysis of opportunistic cooperative communication over
               Nakagami-m fading channels},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {49--53},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541768},
  doi       = {10.1109/WCINS.2010.5541768},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuanZHZF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/YuanZJ10,
  author    = {Hongbo Yuan and
               Dapeng Zhang and
               Zhao Jin},
  title     = {A combination scheme for serial turbo code and differential unitary
               space-time modulation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {13--16},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541876},
  doi       = {10.1109/WCINS.2010.5541876},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/YuanZJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Yue10,
  author    = {Tinghai Yue},
  title     = {The characterizations of binary vector-output plateaued functions},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {396--400},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541807},
  doi       = {10.1109/WCINS.2010.5541807},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Yue10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Yue10a,
  author    = {Tinghai Yue},
  title     = {A construction of binary vector-output plateaued functions},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {401--405},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541808},
  doi       = {10.1109/WCINS.2010.5541808},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Yue10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZangCLY10,
  author    = {Jian Feng Zang and
               Jian Cheng and
               Bo Liu and
               Qiang Yue},
  title     = {Performance comparison of phase modulated system based on {DSSS} with
               {HPA} nonlinearity},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {13--17},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544052},
  doi       = {10.1109/WCINS.2010.5544052},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZangCLY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhanL10,
  author    = {Rui Zhan and
               J{\"{u}}rgen Lindner},
  title     = {Noncoherent space-frequency coding through large-scale optimization
               and efficient detection},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {285--289},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541939},
  doi       = {10.1109/WCINS.2010.5541939},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhanL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/Zhang10,
  author    = {Lijiang Zhang},
  title     = {A provably secure authenticated key exchange protocol},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {292--297},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541786},
  doi       = {10.1109/WCINS.2010.5541786},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/Zhang10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangD10,
  author    = {Han Zhang and
               Xianhua Dai},
  title     = {Maximum-likelihood {CFO} estimation for {MIMO/OFDM} uplink using superimposed
               trainings},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {247--251},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541723},
  doi       = {10.1109/WCINS.2010.5541723},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangJD10,
  author    = {Zhiming Zhang and
               Changgen Jiang and
               Jiangang Deng},
  title     = {A secure anonymous path routing protocol for wireless sensor networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {415--418},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544121},
  doi       = {10.1109/WCINS.2010.5544121},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangJD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangJW10,
  author    = {Jiayan Zhang and
               Ma Jing and
               Shaochuan Wu},
  title     = {Robust transmission of progressive images in the deep space communication},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {4--8},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544054},
  doi       = {10.1109/WCINS.2010.5544054},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangJW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangLC10,
  author    = {Shuai Zhang and
               Jianping Li and
               Chaoshi Cai},
  title     = {An average-entropy-value-based stopping criterion for {BICM-ID}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {98--101},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541897},
  doi       = {10.1109/WCINS.2010.5541897},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangLC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangLGGW10,
  author    = {Shuying Zhang and
               Shufen Liu and
               Yue Gao and
               Jianmei Ge and
               Limin Wang},
  title     = {A credible network intrusion detection system based on grid},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {528--532},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541835},
  doi       = {10.1109/WCINS.2010.5541835},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangLGGW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangLWW10,
  author    = {Luguo Zhang and
               Zheng Li and
               Ruijiao Wang and
               Shengjun Wen},
  title     = {Design and implementation of multiple cryptographic algorithm interface
               circuit based on secure SoC},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {510--514},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541831},
  doi       = {10.1109/WCINS.2010.5541831},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangLWW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangMSX10,
  author    = {Xianyong Zhang and
               Zhiwen Mo and
               Lan Shu and
               Fang Xiong},
  title     = {Algorithms and algorithm analysis of logical {OR} operation of variable
               precision upper approximation operator and grade lower approximation
               operator},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {659--663},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544667},
  doi       = {10.1109/WCINS.2010.5544667},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangMSX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangQ10,
  author    = {Ping Zhang and
               Jiayin Qin},
  title     = {A simple channel shortening equalizer for wireless {TDD-OFDM} systems},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {83--86},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541759},
  doi       = {10.1109/WCINS.2010.5541759},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangQ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangWCW10,
  author    = {Xiang Zhang and
               Wenbo Wang and
               Shuping Chen and
               Chunyi Wang},
  title     = {Multi-cell channel estimation and multi-cell joint detection in {TD-SCDMA}
               system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {130--134},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541750},
  doi       = {10.1109/WCINS.2010.5541750},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangWCW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangWHQL10,
  author    = {Weihua Zhang and
               Zhonghui Wei and
               Xin He and
               Peiyu Qiao and
               Guolong Liang},
  title     = {The design of high speed image acquisition system over Gigabit Ethernet},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {111--115},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541900},
  doi       = {10.1109/WCINS.2010.5541900},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangWHQL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangXW10,
  author    = {Lei Zhang and
               Weibing Xu and
               Haibo Wang},
  title     = {The upper bounds of punctured ring convolutional coded continuous
               phase modulation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {154--157},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541910},
  doi       = {10.1109/WCINS.2010.5541910},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangXW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangXYG10,
  author    = {Jianwu Zhang and
               Guoai Xu and
               Yixian Yang and
               Shize Guo},
  title     = {A method for topology conformance tests under logical constraints},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {386--390},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541805},
  doi       = {10.1109/WCINS.2010.5541805},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangXYG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangY10,
  author    = {Zhijie Zhang and
               Fang Yuan},
  title     = {Compressed video copy detection based on texture analysis},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {612--615},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541852},
  doi       = {10.1109/WCINS.2010.5541852},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangZYL10,
  author    = {Lijun Zhang and
               Yao Zhao and
               Bo Ye and
               Min Luo},
  title     = {An Ethernet over {SONET/SDH} mapping chip and its path protection
               switching Implementation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {120--123},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541902},
  doi       = {10.1109/WCINS.2010.5541902},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhangZYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoFWGR10,
  author    = {Guoan Zhao and
               Liming Fang and
               Jiandong Wang and
               Chunpeng Ge and
               Yongjun Ren},
  title     = {Improved unidirectional chosen-ciphertext secure proxy re-encryption},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {476--480},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541824},
  doi       = {10.1109/WCINS.2010.5541824},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoFWGR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoJ10,
  author    = {Liquan Zhao and
               Yanfei Jia},
  title     = {Interharmonic estimation based on complex valued independent component
               analysis},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {248--251},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541930},
  doi       = {10.1109/WCINS.2010.5541930},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoLZZ10,
  author    = {Hailong Zhao and
               Xianglu Li and
               Jian Zhang and
               Jie Zhou},
  title     = {A novel frequency tracking algorithm in high dynamic environments},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {31--34},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541880},
  doi       = {10.1109/WCINS.2010.5541880},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoLZZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoMG10,
  author    = {Zhuyan Zhao and
               Jianhong Mu and
               Hao Guan},
  title     = {Characterizing the end-to-end throughput in {WMN} using multiple directional
               antennas},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {456--460},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544129},
  doi       = {10.1109/WCINS.2010.5544129},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoMG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoTRF10,
  author    = {Guoan Zhao and
               Canghai Tan and
               Yongjun Ren and
               Liming Fang},
  title     = {An efficient unlinkable secret handshake protocol without {ROM}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {486--490},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541826},
  doi       = {10.1109/WCINS.2010.5541826},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoTRF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoW10,
  author    = {Hongying Zhao and
               Ling Wang},
  title     = {E-commerce website credible model based on fuzzy grey method},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {643--646},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544628},
  doi       = {10.1109/WCINS.2010.5544628},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhaoZTL10,
  author    = {Rentao Zhao and
               Zhifang Zhang and
               Jun Tie and
               Jun Li},
  title     = {Design and implementation of mesh-based current distribution on-line
               monitoring system in aluminum reduction cells},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {143--146},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541745},
  doi       = {10.1109/WCINS.2010.5541745},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhaoZTL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZheWAD10,
  author    = {Xu Zhe and
               Yongsheng Wang and
               Florence Alberge and
               Pierre Duhamel},
  title     = {A turbo iteration algorithm in 16QAM hierarchical modulation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {9--12},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544051},
  doi       = {10.1109/WCINS.2010.5544051},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZheWAD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhouHW10,
  author    = {Bo Zhou and
               Wei Han and
               Huafeng Wu},
  title     = {A network security system model based on {FPGA}},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {455--459},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541820},
  doi       = {10.1109/WCINS.2010.5541820},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhouHW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhouHW10a,
  author    = {Cheng Zhou and
               Ruimin Hu and
               Heng Wang},
  title     = {A higher-order prediction method of spatial cues based on Bayesian
               Gradient model},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {85--89},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541894},
  doi       = {10.1109/WCINS.2010.5541894},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhouHW10a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhouWL10,
  author    = {Jinhe Zhou and
               Tonghai Wu and
               Junmin Leng},
  title     = {Research on voice codec algorithms of {SIP} phone based on embedded
               system},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {183--187},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541916},
  doi       = {10.1109/WCINS.2010.5541916},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhouWL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhouZ10,
  author    = {Zhiheng Zhou and
               Liang Zhou},
  title     = {Network joint coding-aware routing for wireless ad hoc networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {17--21},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541877},
  doi       = {10.1109/WCINS.2010.5541877},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhouZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhuAZ10,
  author    = {Shuyuan Zhu and
               Jeff Siu{-}Kei Au{-}Yeung and
               Bing Zeng},
  title     = {DCT-domain translation for composing better pictures in the MDSQ-based
               multiple description video coding},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {72--76},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541891},
  doi       = {10.1109/WCINS.2010.5541891},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhuAZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhuQZL10,
  author    = {Xuexiu Zhu and
               Jianqing Qi and
               Weiming Zhang and
               Jiufen Liu},
  title     = {Improving the Perturbed Quantization steganography by Modified Matrix
               Encoding},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {437--440},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541815},
  doi       = {10.1109/WCINS.2010.5541815},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhuQZL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhuZP10,
  author    = {Yuntao Zhu and
               Junshan Zhang and
               Kautilya Partel},
  title     = {Stochastic location-aided routing for mobile ad-hoc networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {364--370},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544118},
  doi       = {10.1109/WCINS.2010.5544118},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhuZP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhuoSYL10,
  author    = {Jie Zhuo and
               Chao Sun and
               Yixin Yang and
               Bing Li},
  title     = {Joint signal detection and recovery via Blind Signal Separation},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {67--71},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5541890},
  doi       = {10.1109/WCINS.2010.5541890},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZhuoSYL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZirariCS10,
  author    = {Soumaya Zirari and
               Philippe Canalda and
               Fran{\c{c}}ois Spies},
  title     = {WiFi {GPS} based combined positioning algorithm},
  booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  pages     = {684--688},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/WCINS.2010.5544653},
  doi       = {10.1109/WCINS.2010.5544653},
  timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/ZirariCS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnis/2010,
  title     = {Proceedings of the {IEEE} International Conference on Wireless Communications,
               Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
               Beijing, China},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5524730/proceeding},
  isbn      = {978-1-4244-5850-9},
  timestamp = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wcnis/2010.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics