Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2006 Issue 4
Studying the Trajectories in Phase Space of Henon-Heiles System
HAN Ming;YANG Hua;SUN Ya-wei
..............page:408-410
Study on PolSAR Classification Based on H/α/A Decomposition for Crops
NIU Chao-yang;MA De-bao;ZHANG Xiang-feng
..............page:404-407
Theory Study on the Pressure Property of Fiber Grating with Second Coating
WANG Xin;LI Zhi-zhong;YANG Hua-yong;HU Yong-ming
..............page:396-399,403
Design and Implementation of Radio Communication Signal Generator Based on Soft Radio
WANG Qing;OUYANG Xi;GE Lin-dong
..............page:383-386
Design and Implementation of ARINC429 Signal Generator Based on SCM
YIN Hai-chang;LI Jian-xin
..............page:380-382,390
Receiving and Processing Platform of DVB-S Signal Based on Embedded System
HUANG Yan;LI Lin;LI Huan-yu
..............page:377-379
Simulation of Enhancement HARQ for TD-SCDMA HSDPA Systems
ZHANG Jun;QIAN Kun;WANG Ying-min
..............page:373-376
Research on and Comparison of Algorithms of Searching DwPTS in TD-SCDMA
REN Xiu-kun;HU Han-ying
..............page:370-372,386
Analytical Self-Action Effect of High Power Microwave in Lower Ionosphere
WANG Pan;NIU Zhong-xia;ZHOU Dong-fang
..............page:368-369,379
Analysis and Simulation on Integrity of GHz Serial Signal in High-Speed PCB Design
LU Ping;DU Xiao-ning;LAN Ju-long
..............page:364-367
Realistic Performance Optimization Methods for Parallel Programs
JIANG Guang-qing;WEN Feng
..............page:361-363,376
Research and Design of Service-Oriented Campus Data Grid
XIAO Chen;GUO Shao-zhong;WU Dong-ying;CHEN Xin
..............page:357-360
Network Seperation Based on the SNT
GUO Yu-dong;DONG Wei-yu;WANG Li-xin
..............page:355-356
New Method to Defend against Stack Smashing Attacks for Windows
XUE Han;LI Xiang-he;LI Shuo
..............page:351-354
Research on IPv6 AS-Level Topology Discovery Technology Based on Traceroute
NING Fan-xu;LIU Zhen-shan;WANG Chun-ming
..............page:348-350
Review on Network Processor Architectures and Applications
ZHANG Zheng;ZHAO Rong-cai;YAN Jun;TAI Ming;CHEN Ke
..............page:344-347
Research on Trusted Platform Module
QIN Ge;HAN Wen-bao
..............page:341-343,354
Analysis of Encrypted Proxy Servers Techniques
ZHOU Zheng;SI Xue-ming;HAN Wen-bao
..............page:336-340
Design to Identify Cheaters in the Threshold Secret Sharing Scheme
LIU Xian;HUANG Li
..............page:333-335
Proxy Signature Scheme with Efficient Proxy Revocation from Bilinear Pairing
SONG Xia;QI Wen-feng
..............page:330-332,335
Application of Montgomery Modular Multiplication in Three Factoring Algorithm
ZHAO Long;WANG Zheng;HAN Wen-bao
..............page:326-329
New Attack to Balanced Shrinking Generator
LI Dong-liang;QI Wen-feng
..............page:323-325,329
Improved Authentication and Key Agreement Protocol of 3G
LIU Jia-xiao;ZENG Guang;HAN Wen-bao
..............page:318-322
New Forward Secure Threshold Proxy Signature Scheme
CHENG Xi;QI Wen-feng
..............page:314-317
Family of Nonlinear Filter Functions with Large Linear Complexity
SUN Zhong-hua;QI Wen-feng
..............page:309-313