Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2006 Issue 1
Quantificational Analysis and Research on Airhead
LIU Yang;CHEN Bo;YANG Yang
..............page:99-102
Survivability Evaluating Method of Rational Communication Network
WEI Fu-lin;HAN Zhong-geng;TIAN Yuan;DU Jian-ping
..............page:96-98
Multi-Criterion Decision-Making Using k-Norm TOPSIS
DU Jian-ping;HAN Zhong-geng
..............page:91-95
Cluster Analysis Based Software Project Risk Trends Study
LIANG Tao;OU Li-xiong;HUANG Ke-xin
..............page:88-90,102
Comparison of GPS-Leveling Fitting Methods and Software Programming
LIU Chang-jian;WU Hong-ju;ZHANG Jun
..............page:85-87,102
An Improved Multi-Proxy Multi-Signature Scheme
YANG Lei;ZHOU Yi-wu;LI Yi-fa
..............page:4-6
Modification of a Key-Insulated Signature Scheme
CHENG Hua-qin;MA Chuan-gui;GAO Feng-xiu
..............page:1-3
Study of Technique of 3D Terrain Display on the Embedded System
WANG Gang;YUE Chun-sheng;LI Jian-xin
..............page:82-84
Multi-Scale and Multi-Layer Spatial Database Structure in Embedded GIS
ZHANG Yan;YUE Chun-sheng;XI Ling
..............page:79-81,84
The Implementation of Overlay File System in Embedded Linux
ZENG Fan-jing;YU Yun-xiang;CHANG Li
..............page:75-78
Network Management Model Based on PC Blade
LIU Jia;ZHAO Ming;HAN Wen-bao
..............page:71-74
Design and Implementation of Remote Backup for Network Information System
JIA Yun-jie;OUYANG Dan;WANG Jin-dong;FU Yong-gang
..............page:67-70
On the Features of Lazy Evaluation of Haskell
PANG Jian-min;ZHAO Rong-cai
..............page:63-66
Text Quick-Filtering Based on Network Processor
WANG Qing-qing;LI Ou;JIA Ying-li
..............page:60-62,70
Modification of CIC Decimation Filter and Its FPGA Realization
ZHENG Jin;GE Lin-dong;LI Bing
..............page:57-59
Study of Watermark Based on LDPC
LI Wen-xiong;LIU Yu-jun;WANG Wei-xiang
..............page:51-53
Implementation of Information Hiding Technology in Channel Coding Using Low-Density Parity-Check Code
WANG Wei-xiang;LIU Yu-jun;LI Wen-xiong
..............page:49-50,53
Improved Approach to Target Decomposition in PolSAR
NIU Chao-yang;MA De-bao;WU Jun-ting;ZHANG Xiang-feng
..............page:45-48
Approach to Target Classification Based on Polarimetric Power Ratio and Polarimetric Entropy
ZHANG Xiang-feng;MA De-bao;WU Jun-ting;NIU Chao-yang
..............page:42-44,48
Two-Dimensional Entropy Image Segmentation Based on Chaos Optimization
MA Cheng;GAO Li-ping;JIANG Cheng-shun
..............page:38-41
Application of Joint Detection Algorithm Based on ZF-BDFE in TD-SCDMA
SONG Chang-jian;ZHANG Shui-lian;WANG Ying-min
..............page:34-37
Simulation of High Power Microwave Long Pulse Propagation in Air with a Refined Model
SHAO Ying;NIU Zhong-xia;ZHOU Dong-fang;XING Zhao-wei
..............page:31-33
Application of High Power Microwave to Attacking Cruise Missile
XING Zhao-wei;ZHOU Dong-fang;SHAO Ying;CAO Jin-kun;ZOU Wei
..............page:28-30,37
Some Property about the Compact Convex Set
TANG Feng-jun;LIU Guang-yan;LI Xiao-nan
..............page:25-27
Quasi-Cyclic Codes over Zpk+1
CHEN Lei;CHEN Wei-hong
..............page:23-24,27
Information-Theoretic Analysis of Sequences of the Probability Model for KM(M) Generator
ZHENG Wei;HUANG Xiao-ying;WU Bing-rong
..............page:18-22
Efficient Authentication Scheme for Wireless Sensor Network
LANG Wei-min;GAO Jun-wei;YANG Zong-kai
..............page:14-17
Secure Sealed-Bid Electronic Auction Scheme
MENG Jian;HUANG Xian-zhen
..............page:11-13
Security of XML
YU Guo-liang;HAN Wen-bao
..............page:7-10,22