Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2002 Issue 2
Analysis to Security Mechanism of Bluetooth
tan feng lin ; ge lin dong
..............page:76-78
Grain Online Trade System Based on CA
zhang zhen ; li dong hong ; zhang bo tao ; dong chun li
..............page:72-75
Analysis of the Characteristics of the New Generation of Network Virus
shen ling ; zuo yang
..............page:68-71
Approaches of Data Sharing Between the Driver and the Application
liu jun ; xiao zuo xiang
..............page:65-67
Implementation of Dynamically Monitoring Multi-Web Page
li shen tang ; wang zhen xing ; hu hong xia
..............page:61-64
A Security Solution to Defending New Kinds of Trojan Horse
song wei ; zuo zuo ; wu zuo
..............page:58-60
The Design and Implementation of a Performance Measurement System of Parallel Applications
zhang hui cheng ; wang qing xian ; du zhu ping ; cao rong rong ; li xia ; su ming
..............page:54-57
The New Techniques in Modern Microwave Network Analysis
zhang guang qiu ; ma jin quan ; lei xue ; li zhi gang
..............page:50-53
Application of Turbo Codes in the Third Mobile Communication System
qi sai ; zhang shui lian ; ma xiao jun
..............page:46-49
A Study on Speaker Recognition Using Orthogonal Gaussian Mixture Models
hou feng lei ; zhang kun fan ; wang bing xi
..............page:43-45
QCELP Vocoders Design in CDMA System
qi yong jie ; zhang li zhi ; lu jie qing ; wei yong gao
..............page:39-42
Peak-to-Average Power Ratio in Higher-Order MC-CDMA
zhang li zhi ; qi yong jie ; lu jie qing ; li tong
..............page:36-38
The Design and Performance Emulation of 2GHz~25GHz Conical Log-spiral Antenna
zhang de wei ; xing feng ; zhu guo liang ; niu zhong xia
..............page:32-35
The Optimization Method of Evaluating the Value in a Field Based on Partial Distribution
dai feng ; sun ke wei ; lv liang
..............page:28-31
Cell Search Algorithm Analysis in WCDMA Systems
liu zheng jun ; ran chong sen ; hu han ying ; zhang xiao yi
..............page:23-27
Impoved Algorithm Based on NLN Nine_Clipping Algorithm
zhao ren cai ; tang cai yun
..............page:20-22
On Chinese Complementary Remainder Theorem Ⅰ
lin bai gang
..............page:17-19
Conditional Correlation Properties of Combiners with 1 Bit Memory
zhang wei ming ; li shi qu
..............page:13-16
H.235-Recommendation of Security and Encryption for H-Series Multimedia Terminals
liu zuo fang ; zhang ya juan
..............page:9-12
A Class of Ideal Multi-Secret Sharing Schemes Having the Associated Matroid
gao feng xiu ; huang gen xun ; zhang li min
..............page:6-8
Recursive Construction Methods of the 4-valued Generalized Bent Functions
liu wen fen ; wang zuo ; li shi qu
..............page:1-5