Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of University of Electronic Science and Technology of China
1001-0548
2011 Issue 1
Embedded Gene Expression Programming and Its Application in Function Mining
XIANG Yong;TANG Chang-jie;ZHU Ming-fang;CHEN Yu;DAI Shu-cheng
..............page:116-121
Optimistic Gradual Fair Exchange by Using Threshold Cryptography
LAN Tian;QIN Zhi-guang;ZHAO Yang
..............page:100-104
Dynamic Characteristic Analysis of Closed Loop Systems for the Intelligent Beam with Interval Parameters
WANG Min-juan;CHEN Jian-jun;LIN Li-guang;JIA Ai-qin;WEI Yong-xiang
..............page:152-156
Design of Cognitive Engine for CR Based on Least Squares SVM
JIANG Hong;WU Chun;MA Jing-hui
..............page:41-46
Study on Radiometer Observation Simulation System
FU Xiu-li;SHI Jian-cheng;GUO Ying;JIANG Ling-mei
..............page:64-68,79
Fast Terminal Sliding Mode Control for Singular Systems
LIANG Jia-rong;TAN Hong-yan;FAN Zhong-guang
..............page:11-15
Message Control Method Based on Birth and Death Model in Delay Tolerant Networks
YU Hai-zheng;MA Jian-feng;BIAN Hong
..............page:90-94
Application of Game Theory for Email Feature Selection
SUN Jing-tao;ZHANG Qiu-yu;YUAN Zhan-ting;DONG Jian-she
..............page:95-99
Design of New Level Shifter
FAN Tao;HUANG Qiang;DU Bo;YUAN Guo-shun
..............page:138-141
Aggregated Data Rate Constrained Maximum Lifetime Routing in WSN
TANG Wei;GUO Wei
..............page:30-35
Empirical Mode Decomposition for QRS Complexes and T Wave Detection
GUO Xing-ming;TANG Li-ping;CHEN Li-shan;CHEN Mao-mao
..............page:142-146
Time-Space Based Trust Model for P2P Systems
WANG Yong;HUANG Ke-rui;QIN Zhi-guang;WU Bo
..............page:80-84
Image Super-Resolution Using KPLS
WU Wei;YANG Xiao-min;YU Yan-mei;SHI Yi-xing;HE Xiao-hai
..............page:105-110
Strain Reducing in 3C-SiC Film Growth on Si Substrate
CHEN Da;ZHANG Yu-ming;ZHANG Yi-men;WANG Yue-hu
..............page:134-137
Component-Based Software Design and Formal Description in Real-Time Creditable Service
CHEN Wen-yu;XIANG Tao;WANG Xiao-bin;SANG Nan;SUN Shi-xin
..............page:122-127
Cross-Correlation BP Algorithm for UWB Pulse Through-Wall Radar
WANG Hong;ZHOU Zheng-ou;LI Ting-jun;KONG Ling-jiang
..............page:16-19
Research on Tolerance Handling Method for Analog Fault Diagnosis
YANG Cheng-lin;TIAN Shu-lin;LONG Bing
..............page:47-52
Geometric Methods of Faults Isolation for Analog Diagnosis with Tolerance
YE Li;WANG Hou-jun;YE Peng;TIAN Shu-lin
..............page:53-57
Method to Inhibit DDoS Attack for P2P Overlay Network
LIU Dan;LI Yi-chao;YU San-chao;CHEN Qin-yuan
..............page:85-89
Hardware-Efficient Decomposition Algorithm for IMDCT Computation
LI Hui;LI Ping;WANG Yi-wen
..............page:26-29
Simulation-Based Multi-Signal Modeling with Adaptive Threshold Estimation
CHEN Xiao-mei;MENG Xiao-feng;WANG Guo-hua
..............page:58-63
An Overview on Theory and Algorithm of Support Vector Machines
DING Shi-fei;QI Bing-juan;TAN Hong-yan
..............page:1-10
Single Loop Methods for Reliability Based Design Optimization
ZHANG XU-dong;HUANG Hong-zhong;XIE Min
..............page:157-160
Trusted Mutual Authentication Scheme with Smart Cards and Passwords
YANG Li;MA Jian-feng
..............page:128-133
Fault Detection Mechanism Based on Network Partition for Optical Burst Switching Networks
WANG Ru-yan;LIU Lan-ying;WU Da-peng
..............page:36-40
Data Traffic Optimization in P2P Application Layer
REN Li-yong;LEI Ming;ZHANG Lei
..............page:111-115