Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Communications Technology
1002-0802
2000 Issue 3
xu yan
li zhen bang
..............page:1
Probe in the HF Networking Technology
Luo Qiuxia;Zhou Zhizhong;Zou Shengtang
..............page:2-5,28
HF Network and Its Correlative Technology
Zhu Hongchen;Luo Qiuxia
..............page:6-8
Study on the Topology of HF Networking
shi quan ; jin zuo ; zhao wen fang
..............page:9-11
On the Topology of HF Radio Packet Network
Chen Huawei;Luo Qiuxia;Jin Fan
..............page:12-15
HF Networking Controller and Its Implementation
Zou Shengtang;Luo Qiuxia;Li Yongping;He Jing
..............page:16-18
Reliability Analysis of HF Radio Networking
chen zhong xue ; jin zuo ; zhou zhi zhong
..............page:19-21
Applications of Block Design for HF Radio Networking
Chen Zhongxue;Jin Fan;Chen Huawei;Shi Quan
..............page:22-25
Invulnerability Assessment of HF Communication Networking Based on Nodes
Chen Zhongxue;Jin Fan;Zhou Shengtang;Zhu Hongchen
..............page:26-28
Research of High Frequency Data Link Protocol
Rao Zhihong;Zhou Zhizhong;Zhou Wen
..............page:29-30,33
High Speed Single Tone HF MODEM
Zhou Zhizhong;Luo Qiuxia;Li Kailin
..............page:31-33
The Study of HF Frequency Hopping Communication Technology
Li Ming;Qi Renhua;Zhu Hongchen
..............page:34-37
Analysis of Error-control in HF Adaptive Data Transmission
Jia Rupeng;Zhou Zhizhong
..............page:38-42
Study on 8-ary FSK Modem for HF ALE System and Its DSP Implementation
Zhang Qu;Li Xiaofeng;Zhang Hao
..............page:43-47
Cryptanalysis of H-Y Key Authentication Scheme and Its Revised Scheme
Li Hu;Chen Huanghai;Zhu Hongwen
..............page:48-50
Key Exchange Implementation Based on ISAKM
Li Hu;Chen Huanghai;Zhu Hongwen
..............page:51-54
Kerberos Technology Used in Certificate Operation of LDAP
Lu Songnian;Cai Yibo;Xue Zhi
..............page:55-58
The Trust Mechanism of Public Key Infrastructure
Meng Guie;Yang Yuhang
..............page:59-62
Dynamic Security Mechanisms for Multicasting Synchronous Collaboration
Zhu Kangxin;Yin Ying;Li Jianhua;Zhu Hongwen
..............page:63-65
Wireless Local Area Network and Its Security Mechanism
He Li;Qu Baozhang
..............page:66-69,73
Impulse Noise Detection and Removal Using Fuzzy Reasoning
Kim Sunchol;Tan Xinquan
..............page:74-77
A Low Bit Rate Speech Coding Method Based on CELP and LZH
Musyaju Raju;Yao Tianren
..............page:78-81
The Research and Design of Transceiver for ADSL
Gong Min
..............page:82-85,92
A New Data Acquisition Method in Software Radio Receiver
Chen Juanyong;Xu Jilin
..............page:86-88
Analysis of Sender Delay of Unicast-Based Reliable Synchronous Collaboration Communication
Zhu Kangxin;Li Ke;Li Jianhua;Zhu Hongwen
..............page:89-92
The Research Trend for Adaptive Power Amplifiers in Mobile Transmitters
Wu shuyue;Zhang Eryang
..............page:93-96
A Event-triggered Topology Updating Strategy of Tactical Internet
Zhou Ling;Li Ying;Ye Yousun
..............page:101-104