Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of China Acadewy of Electronics and Information Technology
1673-5692
2008 Issue 6
Performance Analysis for SAR System Based on Digital Beamforming in Azimuth
WU Zhi-gang;LIU Guang-yan
..............page:644-647
On the Application of Failure Mode and Effects Analysis to Integrated Logistics Support
ZHEN Jun-yi;ZHAO Xiao-lin;MENG Qing-hai
..............page:648-652
Design of Double Septum Waveguide Filter Based on Mode Matching Method
SHEN Kai;WANG Guang-ming;QI Li-hui
..............page:653-656
Research on SAR Image Registration Based on Homograph Matrix
WANG Jin-quan;LI Qin-fu
..............page:657-660
Research on Software Support Techniques for Equipment
LIU Shi-jun
..............page:639-643
Research on Phase-calibrating of Tracking Radar
HU Jin-dong
..............page:635-638
An Improved Method of Maneuvering Target Detection for High-Frequency Radar
YANG Fei;ZHU Bing-yuan;HUANG Yin-he;LEI Zhi-yong
..............page:627-630
Complete Graph Algorithm Based on Four Level Forecast Model
WANG Qiang;GAO Bin;JIA Cui-xia
..............page:623-626
Overview on Common Data Link of U. S. Force
LIU Hong-jun
..............page:608-612
Analysis and Improvement of Kademlia's Looking up Performance
ZHANG Zheng;HOU Bin;LU Yu-qin;LIU Gang;LI Wei-hai
..............page:604-607
A Study of Anonymity in Hash Chain Based Micro-payment
HE Wen-xin;LV Yu-qin;ZHAO Xin;LI Wei-hai
..............page:599-603
Research on the DoS Attacks on Security Protocol by Formal Analysis Method
Zhou Shi-jian;Jiang Rui;Yang Xiao-hui
..............page:592-598
Trusted Software Model and Security Evaluation in Telecom Field with Open Network
JI Yi-mu;HU Luo-quan;CHEN Zhi
..............page:586-591
Application of Fractal Theory in Cryptographic Algorithm
LIU Wen-tao;SUN Wen-sheng
..............page:580-585
Some Thoughts on Chaotic Cryptography and Its Key Issues
YIN Ru-ming;YUAN Jian
..............page:573-579
A Multi Channel MAC Protocol with Load Sensing for Ad Hoe Networks
PAN Su;LIU Sheng-mei
..............page:568-572
A Survey on Reversible Image Authentication
GU Qiao-lun;GAO Tie-gang
..............page:563-567
Cryptology and Non-deterministic Turing Machine
YANG Zheng-ling
..............page:558-562
The Network Development and Its Broader Security Requirement
YUAN Jian;WANG Yue
..............page:551-557