Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecommunications Science
1000-0801
2007 Issue 2
zong bian ji yu
..............
page:插1
jian xun
..............
page:5,40,47,51,83,91,94,98,107-108
feng huo tong xin : yi pin pai zhi sheng wei lai
..............
page:105-106
p2p huan jing zhong kuan dai cheng yu wang you hua ce lue tan tao
xing xiao liang ; zhang xin jian
..............
page:103-104
xiao yuan wang de jian she si lu yu fang an fen xi
du bao ju
..............
page:99-103
san zhong wu xian fen bu shi wang luo de bi jiao
li ming ; liu yue yang
..............
page:95-98
ji yu ying yong ji cheng wang guan de dian xin yun ying shang ict rong he tong xin jie jue fang an
liu zuo ; zhou jun ; li rui
..............
page:92-94
ji shi tong xin yu zhong guo dian xin fa zhan ce lue tan tao
lv ai min ; li rong rong
..............
page:88-91
A NTP Synchronous Method of Protocol Testing Based on Virtual Machine Mechanism
Jiang Kui;Luo Xuehui;Zhang Fan;Yang Wenling
..............
page:84-87
Economics Comparison of ASON Mesh and SDH Ring
Xu Rong;Gong Qian;Li Han
..............
page:12-16
Data Service of Mobile Communication Operators: From Management on Service to Operator on Content
Xie Feng
..............
page:6-11
Characteristics and Latest Development of Carrier Grade Ethernet for MAN
Wei Leping
..............
page:1-5
Studies on the Core Competence Evaluation Index System and Methods of China Telecom Firms
Peng Jihong;Tang Renwu
..............
page:77-83
Survey on Addressing Methods of Wireless Sensor Networks
Hou Huifeng;Liu Xiangwen;Yu Hongyi;Hu Hanying
..............
page:67-77
Design and Analysis of SPIT Filtering System
Luo Ming;Wen Yingyou;Zhao Hong
..............
page:63-66
Impact on Operator and Countermeasures for Internal Control Audit
Fu Jian
..............
page:59-62
Different Scenarios and Technical Requirements of Emergency Telecommunication
Zhang Xueli
..............
page:56-58
Research on Security Risk Assessment of Telecom Network
Wei Wei
..............
page:52-55
How to Build Perfect Network and Information Security System to Manage Risks
Xu Haidong;Chen Xin;Liu Nan;Wei Lihong
..............
page:48-51
Disaster Backup and Recovery of Telecom Networks
Yang Yang
..............
page:44-47
Study on Evolution of Network Security Technology
Chen Jianyong
..............
page:41-43
Strategy Study of Security About Network and Information
Wei Liang
..............
page:37-40
Research on OAM of EPON/GPON Based FTTH Access Network
Shen Chengbin;Lu Jun;Jiang Ming;Zhao Huandong
..............
page:33-36
Research of Technology of Abnormal Traffic Mitigation and Its Application in IP Network
Zhuang Yirong
..............
page:30-33
Investigation on Carrier-grade Ethernet Technology——About PBT & T-MPLS Technologies
Liu Jie
..............
page:24-29
Research of ASON Carrying IP Network (Ⅰ)
Zhou Rongsheng;Du Chunsheng
..............
page:17-23