Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecommunications Science
1000-0801
2006 Issue 2
zhu bian ji yu
..............
page:目录前1页
jian xun
..............
page:22,76,86,95-97
epon ying yong qu de zhong da tu po guang xian dao hu reng xu nu li
liang hai bin ; chen zuo
..............
page:94
Synthetically Estimating and Optimizing of IP Metropolitan Area Network
Yang Jie;Tang Jinghua
..............
page:5-8
Comparison of Transmission Schemes for 3G Long Term Evolution
Xie Xianzhong
..............
page:1-4
"ling tong wu sheng " gou zhu rong he gu wang
ut si da kang gong si
..............
page:93-94
xin xing kuan dai cheng yu wang zhong de er ceng hui ju ji shu tan tao
ma xiao hua
..............
page:89-93
guan yu zhong xing 8220 duo duan kou shang xing zu wang fang shi de gu zhang yuan yin tan tao
yu jian
..............
page:87-89
zxpcs xi tong dan tong fen xi yu chu li
wen mu qi ; zhao zhi dan ; huang mian chao
..............
page:84-86
lun td-scdma wang luo gui hua
zhang jian ming ; yang da cheng
..............
page:79-83
td-scdma ke bian qie huan dian de shi shi ji gan rao fen xi
zhang yu
..............
page:77-79
epon de tdm yu yin jie ru jia zhi fen xi
sun shu he ; deng yu
..............
page:75-76
ji yu sui ji hou tui fang fa de bpon shang xing zhu ce guo cheng yan jiu ji fang zhen
yang guang xiang ; tao de zuo ; he yan
..............
page:73-75
xu jia xin xi zha pian xing wei dui yi dong wang luo de wei hai ji dui ce
wu zhi xin
..............
page:69-72
ppp lian jie jian li cheng gong lv you hua qian tan
wang bao hua
..............
page:66-69
yi dong cheng yu chuan shu wang zu wang jie gou ji mian xiang 3g yan jin tan tao
qian jun bo ; tian jun
..............
page:60-65
ims ji qi zai yi dong tong xin zhong de ying yong yan jiu
ye wei ming ; yuan zuo ; zhou hong ; wang li ying
..............
page:57-60
Security Issue and Implementation Strategy of Softswitch
Zhao Jingxi
..............
page:53-56
Spam Mail and Process Method
Luo Hao;Fang Binxing;Tang Jianqi
..............
page:48-52
Provide ISP Security by Sliced Network Monitoring System
Ji Ye
..............
page:43-48
Research of the New Telecommunication Network Threat BotNet and Its Lifecycle
Chen Mingqi;Cui Xiang
..............
page:39-42
Research on the Framework of Network Security Operation Center
Gu Liyong;Huang Yuanfei;Luo Wanbo
..............
page:35-39
Consolidating Security Auditing to Drive Network and Information Security Closed-loop Management
Zhao Wei
..............
page:31-34
The Security of Backbone and Emergency Response System for the Operator
Fu Jian;Zhang Ling
..............
page:27-30
Status and Study Focuses of Information Security Standardization
Huang Yuanfei;Jin Liping
..............
page:23-26
Study of Lawful Interception in NGN
Cao Xiong;Wang Furong;Mo Yijun
..............
page:19-22
Application Study on Grid Technique Used in Telecommunication
Ji Yimu;Wang Ruchuan;Wang Haiyan
..............
page:15-19
Study on Innovation Services for Intelligentized PSTN
Ma Xiaojun;Ding Hong;Ding Peng
..............
page:8-14