Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecom Market
1006-6675
2012 Issue 6
Detecting Authentication Methods of the Source Camera Forensics
sun xiao zuo ; li ye zhou ; niu shao zhang ; meng xian zhe
..............page:100-104
Research of Data Verification of Telecommunication Resource Management System
ren qin ; wu de sheng ; chao yu jian
..............page:80-84
Trajectory Optimization for Guided Rockets with Impact Angle Constraint
tingting zhang;haoping she
..............page:127-132
Design Of Advanced License Plate Recognition Algorithm
yu yue ; yu hong tao ; gu mei xia
..............page:27-32
men jin ji shu de wei lai
tam hulusi
..............page:16-17
xin pin zhi chuang
..............page:18-20
tong xin duan bo
..............page:21-22
ji yu snmp de epon she bei mib xin xi cai ji de yan jiu
ma ping ; shao bo ; zhang zuo ; zhu hang
..............page:40-44
Trusted Windows Terminal Technology Research
li hai yan
..............page:95-99
qian tan bian ya qi cha dong bao hu dai fu he shi yan de ying yong
zuo ye fei ; zhang yi jun ; wu di
..............page:24-26
Low power optimization method for 5/3 wavelet transform Based on C6748 DSP
yao tian wen ; zhou hai fang ; fang min quan ; shen xiao long
..............page:89-94
Efficient Intrusion Detection for High-speed Networks
gu mei xia ; ma gao long ; yu yue
..............page:45-50
ding ceng she ji ke xue guan li
..............page:15-15
yan hua bao zhu cang ku lei dian fang hu she ji
han zhou peng ; wang bin ; luo rui ying ; liang zhen wen
..............page:77-79
SOA application research on MIS development
chen hui min
..............page:33-39
A study of worm propagation mechanism based on the diurnal pattern of vulnerable hosts
yu xiang ; liu bo ; ma xiao long
..............page:145-151
The Power Communication Four Backbone Network Intensive Management and Control System
wu de sheng ; chao yu jian ; deng zhi yang
..............page:73-76
zhong guo yi dong li 4g you duo yuan
ke mei jun
..............page:5-6
System Wide Information Management Architecture Designing
luo yi ; xin quan ; wang pei
..............page:111-115
Optimized design of pulse shaping filter
geng meng
..............page:116-121
Location-Aided Reliable Routing for Opportunistic Networks
yong yang;zhi ren;jibi li
..............page:133-139
Power Telecommunication Index Evaluation System
chao yu jian ; shi jian ; liu jun
..............page:69-72
Research on the Weather Information Exchange Model
zhang juan qing
..............page:108-110
Rail Transit Normality Passenger Flow Forecasting ModelBased on PSO-SMO
songsongpang;jianchu kang;yan zhang
..............page:56-63